Alternatives to DynamicGroup
Compare DynamicGroup alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to DynamicGroup in 2024. Compare features, ratings, user reviews, pricing, and more from DynamicGroup competitors and alternatives in order to make an informed decision for your business.
-
1
Cisco Duo
Cisco
Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO. -
2
ManageEngine ADManager Plus
ManageEngine
ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. Create multiple users and groups in Office 365, manage licenses, create Exchange mailboxes, migrate mailboxes, set storage limits, add proxy addresses, and more. -
3
SecurEnds
SecurEnds
SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations. -
4
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
5
Netwrix GroupID
Netwrix
The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector. -
6
AWS Directory Service
Amazon
AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft Active Directory (AD), enables your directory-aware workloads and AWS resources to use managed Active Directory (AD) in AWS. AWS Managed Microsoft AD is built on actual Microsoft AD and does not require you to synchronize or replicate data from your existing Active Directory to the cloud. You can use the standard AD administration tools and take advantage of the built-in AD features, such as Group Policy and single sign-on. With AWS Managed Microsoft AD, you can easily join Amazon EC2 and Amazon RDS for SQL Server instances to your domain, and use AWS End User Computing (EUC) services, such as Amazon WorkSpaces, with AD users and groups. AWS Managed Microsoft AD makes it easy to migrate AD-dependent applications and Windows workloads to AWS. With AWS Managed Microsoft AD, you can use Group Policies to manage EC2 instances and run AD-dependent applications in the AWS Cloud.Starting Price: $0.018 -
7
Without effective Active Directory management tools, administrators will struggle to manage critical Microsoft AD environments efficiently. Doing more with less increases the likelihood of accidental changes to AD objects, configurations and Group Policy data that can raise your risk of errors and downtime. The need to enforce internal policies and address compliance regulations only adds to the challenge. Active Administrator is a complete and integrated Microsoft AD management software solution that helps you move faster and more nimbly than with native tools. With a single consolidated view into the management of your AD, you can address Active Directory administration gaps left by native tools and quickly meet auditing requirements and security needs. With integrated AD administration and seamless permissions management, you will maintain business continuity, increase IT efficiency and minimize security risks.
-
8
LoginTC
Cyphercor
Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.Starting Price: $3/month/user -
9
GPOADmin
Quest
Simplify Active Directory group policy management and governance. GPOADmin is a third-party group policy management and governance solution that allows you to search, administer, verify, compare, update, roll back and consolidate GPOs to ensure consistency and avoid long-term GPO proliferation. GPO comparison features combined with enhanced security and workflow capabilities means controlling and securing your Windows infrastructure while supporting governance initiatives. Getting GPOs right is critical, one wrong GPO with a seemingly innocuous setting can inflict massive detrimental effects to the security posture of thousands of systems in your network within minutes. With GPOADmin, you can automate critical Group Policy management and governance tasks to reduce risk and eliminate manual processes. Improve GPO auditing and verify setting consistency quickly and easily with advanced, side-by-side GPO version comparisons at various intervals. -
10
Heimdal Application Control
Heimdal®
Heimdal Application Control is a novel approach to integrative application management and user rights curation. Modular and easy to set up, App Control empowers the system administrator to create all-encompassing rule-based frameworks, streamline auto-dismissal or auto-approval flows, and enforce individual rights per Active Directory group. The tool’s uniqueness comes from its ability to perfectly pair with a (PAM) Privileged Access Management solution, imparting the user with granular oversight of software inventories and hardware assets. -
11
HelloID
Tools4ever
HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of IDM into your hands to meet current and future needs. HelloID Modules: Provisioning - Automate the entire user lifecycle process by connecting your HR or SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. Service Automation - Transform your legacy help desk into a fully automated “Self-Service” platform Access Management - Zero-Trust security with 1-click Single Sign-On (SSO) and Multifactor Authentication (MFA)Starting Price: 2.18/month/user -
12
Rippling
Rippling
Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today. -
13
onetool
onetool
Manage all aspects of your organizations SaaS subscriptions on an easy to use platform. Add employees to every app they need and handle their SaaS onboarding with one click. Get a full overview of all your apps and track usage & spend. Save an average of 20% by eliminating shadow IT and unused licenses. When an employee leaves the organization, automatically disable their access to all your apps. onetool lets you easily manage employee access to all your SaaS tools – no matter what plan you are on. Save time and stay secure by handling all on- and offboarding workflows in one place. Manage your employees’ app access with only a few clicks on a single dashboard. Manage & monitor tool usage by department and set up access rules. onetool provides you with a full picture of your organizations’ SaaS adoption by discovering and monitoring active licenses, app usage & spend. Easily track all SaaS users and their app activity to identify Shadow IT or unused licenses.Starting Price: $5 per employee per month -
14
Ok Goldy
Goldy Arora
Ok Goldy is a free Google Sheets add on which can help you perform bulk operations in Google Workspace. Bulk Create, Update, Suspend, Delete, Export Google Workspace Users, Groups, Members, Aliases and much more…. “Ok Goldy” has passed all the checks by Google’s review process and is now trusted by over 15,000 Google Workspace Administrators to perform bulk Google Workspace operations.Starting Price: Free -
15
Hyena
SystemTools Software
Used by tens of thousands of system administrators worldwide for twenty-five (25) years, Hyena is known throughout the industry as one of the top Windows and Active Directory management utilities available...at any price! It is designed to both simplify and centralize nearly all of the day-to-day management tasks, while providing new capabilities for system administration. This functionality is provided in a single, centralized, easy to use product. Whether your organization is using Windows 2003, Windows 2019 or anything and everything in between, you can manage everything with one tool. Hyena, our comprehensive and award-winning Active Directory and Windows system management software, now includes multiple ways to mass-update Active Directory information : Use the new Active Task feature for mass updating and importing of Active Directory information, or use the Active Editor, an interactive Active Directory editor that lets you freely move around and modify directory information.Starting Price: $329 -
16
SysTools Active Directory Management
SysTools
Active directory management tool allows to edit, remove, create bulk users in AD. Allows to batch migrate user to new domain active directory. List, preview, and manage active directory user accounts from the computer. Provides an option to rollback active directory changes. Create multiple users in active directory directly from software home screen. Allows to move user account from one OU to another OU (Organizational Unit). Allows to find, delete, change, rename, and create organizational unit in AD. Active Directory Admin Username and Password are required. MS Exchange Server should be available and active on the user machine. Through AD Console, its administrator can perform multiple tasks right from a single panel. It is possible to perform numerous operations such as, create a new user or organizational unit, delete user, modify user attributes, move AD user to another OU, and if required, undo all the changes using rollback options.Starting Price: $499 -
17
Netwrix Usercube
Netwrix
Identity Governance and Administration (IGA) brings together all of an organization’s processes to enable each identified individual to have the correct access rights at the right time for the right reasons. The directory is powered by real-time movement of people, administration tasks and personal updates through the self-service screen. This constantly ensures a very high level of accuracy of the information contained. Inside organizations, people frequently move around (hires, departures, subsidiary creations, office closings, reorganizations, moves. Because the company’s organization is modeled in Usercube, workflows inform the necessary people in real time, making these actors more efficient and therefore reducing wasted time with each change. Additionally, the constantly-updated repository and the traceability of all requests allows easy generation of compliance reports. -
18
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications. -
19
Nuvolex
Nuvolex
Nuvolex Enables IT Organizations to simplify daily administration across all M365 and Azure workloads, leveraging extensive workflow automation. IT Organizations can easily manage all of their Users, Tenants, Licenses and Microsoft Cloud Services through the ManageX™Single Pane Of Glass administration portal. Ability to push multiple M365 configuration changes and Polices to any number of tenants in just a few mouse clicks. Save M365 service configurations and Policies as a template to ensure consistent and compliant configuration policies for all the end tenants managed by your team. Gain valuable insight into all of your Tenant’s data to drive increased security and lower TCO of your Cloud Services. View a single consolidated report to gain insight into your tenants usage, metrics and licensing. -
20
Jamf Connect
Jamf
In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.Starting Price: $2 per user per month -
21
Oracle Identity Management
Oracle
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service. -
22
RapidScale Identity as a Service
RapidScale
RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you. -
23
Entrust Identity as a Service
Entrust
Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats. -
24
Tuebora
Tuebora
Natural language user interface eliminates UI adoption risks. Complete deployment in just a few weeks. Augment or replace with only the microservices you need. Fast-build SCIM compliant connectors. Design new IAM processes that fit your organization. Machine learning pinpoints errors and finds efficiencies. Support your “Cloud-first” strategy. Built for the cloud to control identity everywhere. Smart Businesses Rely on Tuebora’s platform of identity solutions to unlock business value and reduce risk. Use our Natural Language User Interface to communicate hundreds of IAM scenarios to your business applications. Suddenly, your IAM processes are natural, fast and agile. Our implementation of machine learning identifies unused account access and provisioning activities performed outside established processes. Rapid adoption of cloud applications requires managing identity everywhere. Traditional vendor solutions don’t natively support cloud identity needs. -
25
Vyapin Microsoft 365 Manager
Vyapin Software Systems
Vyapin Microsoft 365 Manager is a one-stop O365 solution that bridges the gaps in native Office 365 Portal to manage Users, Groups, Licenses, Permissions & More. The software provides automated features for Office 365 License Management, User provisioning and deprovisioning in bulk, administration of Users, Groups, including Security groups and Distribution groups, and mailbox permissions management without using Powershell scripts. With complete audit trails for all administrative tasks, you can manage Office 365 straight from the Desktop in just a few clicks ensuring that the health and security of your Office 365 is never compromised. When it comes to automation and administrative tasks that can be done in bulk, the native Office 365 Management portal falls short in several areas. When provisioning users, administrators must perform a series of tasks that allows users to get going with their work from day one without wait. -
26
SysKit Point
SysKit
Empower your end-users to take part in Office 365 governance. Request your Microsoft Teams, Microsoft 365 Groups, and site owners to regularly manage their inactive resources to cut tenant clutter. Schedule periodical access reviews to resource owners and make sure that the right people have the right access. Get a full overview of your Office 365 environment and ownership across Microsoft Teams, SharePoint Online, Microsoft 365 Groups, and OneDrive in a central web interface. Create easy-to-read security reports and proactively manage users and access. Being in a highly regulated industry, Coripharma needed a central point where they can track who has access to what in their large environment filled with intellectual properties. Coripharma has saved a half-person worth of work with SysKit Point and gained a fast central point for access overview and management that keeps them compliant with laws and regulations. -
27
ShareGate
Workleap
Skip sifting through multiple admin centers to get visibility on your teams and Microsoft 365 groups. Connect your tenant to ShareGate and within a few minutes you’ll be able to see who created teams, why they were created, whether they’re currently in use and, if so, how. ShareGate crawls your tenant daily and looks for unused teams and groups. Delete or archive them in a click to reduce sprawl and make it easier for your users to find what they’re looking for in Microsoft 365. ShareGate Teams chatbot helps you collect valuable information from owners so you can understand each team’s purpose and level of sensitivity. That way you can assess the degree of risk involved for your business and make the right decisions about their teams. Right-size your level of security to the needs of each team. With ShareGate, all the PowerShell scripts you’d write yourself are just a click away. Give users more freedom to use their tools. Easily set up guardrails and enjoy more peace of mind.Starting Price: $4,495 per year -
28
Authomize
Authomize
Authomize continuously detects all effective relationships between both human and machine identities to company assets throughout all your organization’s environments (IaaS, PaaS, SaaS, Data, On-prem), down to the most granular company asset and normalized consistently across apps. Authomize offers a continuously updated inventory of your identities, assets and access policies, blocking unintended access with guardrails and alerting on anomalies and various risks. Authomize’s AI-driven engine harnesses its comprehensive and granular visibility over all of an organization’s environments to construct an optimal set of access policies for any identity-asset relationship. This SmartGroup technology performs continuous access modeling, self-correcting as it incorporates new inputs such as actual usage, activities and decisions you take to create an optimal and accurate permission structure. -
29
ActivMan
ANB Software Ltd
ActivMan takes all the good features of Microsoft's Active Directory Users MMC snapin, and adds some extremely useful features, i.e. mass manipulation, templates, importing of users, and extracting using directly from your MIS (e.g. SIMS), whilst also improving the efficiency of managing users. ActivMan is an out-of-the-box Active Directory user manager designed to be easy-to-use and to drastically improve the process of creating new user accounts, home directories, and shares of new students and staff, whilst also disabling/moving/deleting (optionally) students and staff who have left. It has all the essential features an organisation requires in order to drastically improve the process of managing user accounts. In essence, ActivMan will synchronise your Active Directory network to your MIS. With new features and customer requests being developed all the time, ActivMan is the perfect choice as your user manager solution.Starting Price: £120 per year -
30
Tools4ever IAM
Tools4ever
Streamline your operational efficiency and control compliance efforts for HIPPA, SOX, and other requirements. IAM provides user provisioning, centralized account management, and role-based access control by integrating personnel and directory systems. Automated onboarding and offboarding ensure that only the right people have the right access at the right time. Want to get a better understanding of how IAM can operate in your environment? Attempting to manually create, manage, and disable user accounts in today’s complex corporate environment is its own full-time job. Tools4ever’s IAM User Provisioning software creates a connection between HR systems, directory services (e.g., Active Directory, LDAP, GSuite), and downstream services. The entire process is automated, recovering substantial bandwidth for IT staff. -
31
PeoplePlatform
Web Active Directory
PeoplePlatform allows you to automate and delegate all the common tasks associated with Identity Management. Stop spending time on provisioning, deprovisioning and directory updates, instead empower your organization to handle these tasks through a simple web interface. Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned. -
32
JumpCloud
JumpCloud
JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.Starting Price: $9/user -
33
BoxyHQ
BoxyHQ
Security Building Blocks for Developers. BoxyHQ offers a suite of open-source APIs for security and privacy, helping engineering teams build and ship compliant applications faster, reducing Time to Market without sacrificing their security posture. 1. Enterprise Single Sign On (SAML/OIDC SSO) 2. Directory Sync 3. Audit Logs 4. Data Privacy Vault (PII, PCI, PHI compliant)Starting Price: $0 -
34
ProfileTailor
Xpandion
ProfileTailor Security & Authorizations. Take Control over SAP Authorizations! Not only are SAP Authorizations complex, but also the authorization team has to be in control at all times. Events like granting sensitive permissions or identifying suspicious use of risky SAP authorizations cannot be ignored and must be taken care of immediately. In answer to these needs, ProfileTailor Dynamics Security & Authorizations was designed to give a 360° control over SAP Authorizations and Behavior-based Security. Get Insights about SAP Authorizations, Be the Expert! ProfileTailor Dynamics Security & Authorizations was designed with both novice users and professional experts in mind. Novice users can easily feel like experts, having all the in-depth data of SAP Authorizations without the need to delve into the fine details of SAP Authorizations, like objects and fields. They can optimize authorization roles and be in control over sensitive SAP permissions. -
35
M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.Starting Price: $345 per year
-
36
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management is a comprehensive solution in the areas of IAM (Identity and Access Management) and CIAM (Customer Identity and Access Management). The different modules of this platform include Single Sign-On (SSO), Multi-Factor Authentication (MFA or 2FA), Adaptive Authentication, Directory Services, Lifecycle Management. Ask, capture and safely store information about the user’s consent during their registration process. Manage terms of the service lifecycle, prompting the user to accept new terms when necessary. Track all changes for consents, permissions and terms of service. This feature helps your business comply with regulations such as GDPR. Set up forms to gradually capture data from users in different moments of their journey (on first contact, after the nth login, coupon redeeming). With this technique, you avoid overwhelming customers with long forms during their registration process but still get the chance to progressively build their profile. -
37
DoControl
DoControl
DoControl enables fine-grained policies to control how employees, external users, and admins access, share and manipulate data stored in SaaS apps. The complexity of SaaS apps, users, and admins results in a ton of user interactions and a dynamic attack surface that are hard to follow. DoControl provides on-going visibility to data exposures across multiple SaaS apps. Different SaaS apps offer different security features, making it nearly impossible to enforce security policies consistently across the board. DoControl’s Data Access Controls redefine how threat prevention is done at scale. Protecting against unknown or unusual activity requires security teams to ingest logs from multiple apps, organize the metadata, detect anomalies, and take actions. DoControl automates all of it right out of the box. -
38
Entrust Identity Enterprise
Entrust
The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card. -
39
Visual Identity Suite
Core Security (Fortra)
As part of the Core Security Identity Governance and Administration portfolio of solutions, previously offered by Courion, Visual Identity Suite (VIS) empowers organizations to see user privileges and access certifications in a whole new way, leveraging an intelligent, visual-first approach. By providing an easy-to-use graphical interface, you can see common user entitlements and quickly identify outliers to make informed decisions about who has access to what. VIS enables you to visualize what access looks like in your business, so you can intelligently mitigate identity risk and manage identity chaos within your organization. Mitigating identity risk in your organization requires intelligent and visible identity governance across all of your environments. This means leveraging a visual-first approach for the creation and management of roles and access reviews, combined with intelligence-enabled context, to simplify your identity governance and administration processes. -
40
Fischer Identity
Fischer International Identity
Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management. -
41
RapidIdentity
Identity Automation
Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today! -
42
my-IAM TeamSpace
FirstAttribute AG
With my-IAM TeamSpace, you create a compliance-oriented way of working with Microsoft Teams. Both IT admins and users use and manage Teams through my-IAM TeamSpace. M365 admins define security settings for teams, which they categorize and map into templates. Responsibilities, permissions, data security and granular customizations are defined in advance. The big advantage: employees then take over the regulated and controlled administration of teams. -
43
Security Weaver
Security Weaver
With the frequency of software license audits increasing, enterprises must ensure software license allocations are in compliance to safeguard against unbudgeted license fees come audit time. Our License Management module is the only solution that offers compliant SAP license management automation integrated with automated user provisioning, giving your organization the ability to optimize SAP and other complex licenses. We reduce the work and worry of choosing a governance, risk, and compliance (GRC) solution. Our simple process helps any organization of any size quickly move towards their GRC goals. Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software. Our flagship software suite, Security Weaver is engineered to give customers a unified view of their enterprise-wide application environment so they can reduce the risk of fraud, accelerate the efficiency of operations and ease the burden of ongoing compliance requirements. -
44
Permeasyon
Anduseit
Employees come and go. Depending on your company sector and size, you may be hiring new employees very often. And every time a new employee starts in your company, he needs to have access to different applications. Different people will need to be contacted to authorize and assign all the permissions, which may take several days with the consequent loss of working time. However, Permeasyon solves this task within minutes. The needs of a company vary over time: new projects that start and others that finish, but also projects that move to maintenance needing less human resources and, more critical, projects requiring higher resources for some time to meet deadlines or client requirements. These situations mean an urgent need to relocate current employees, adding or removing permissions to those users to accomplish with important milestones. How can you correctly relocate the users in a timely and efficient way when needed? Permeasyon is the perfect tool to help you achieve this task. -
45
Ilantus Compact Identity
Ilantus Technologies
For the first time there is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons. This includes Access Management as well as Identity Governance and Administration. A unique online digital guidance system helps you implement the solution step-by-step and at your own pace. Unlike other vendors, Ilantus also offers implementation support as per your needs at no extra charge. Seamless SSO with ‘no app left behind’, including on-premise and thick-client apps. Web apps, federated, non-federated, thick-client, legacy or custom apps – will all be included in your SSO environment. Mobile apps and IOT devices are supported too. Homegrown app? Our interactive digital help guide ensures that this will not be an issue. And, if you need assistance with it, call Ilantus’ dedicated helpline available 24 hours from Monday to Friday and we will do the integration for you. -
46
Sysgem Enterprise Manager
Sysgem
Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM. SEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework. Unite, simplify and integrate core system administration solutions across a multi-platform environment. Unify user account management across a multi-platform, multi-application environment. Manage the controlled distribution and deployment of configuration files across infrastructure.Starting Price: $200 per user per month -
47
Symantec IGA
Broadcom
While user experience and instantaneous access to data and services have become the norm, the IT infrastructure that supports these efforts has grown exponentially larger and more complex. In addition, IT organizations are facing ongoing pressures to reduce operational expenses while also maintaining compliance with a growing list of industry and governmental regulations. The end result is an IT organization that must give more people more access to disparate applications in less time, all the while, remaining accountable to a flood of parties governing said access. Today's identity governance and administration technologies must be able to provide broad provisioning support for on-premises and cloud apps, as well as entitlements certification to certify that privileges are appropriate, all while scaling to store millions of user identities. -
48
Juniper Identity Management Service
Juniper Networks
Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting. -
49
Avatier Identity Anywhere
Avatier
Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.Starting Price: $5.00/one-time/user -
50
HORACIUS IAM
e-trust
The agility of business processes directly depends on the management of access rights to systems, and choosing a platform for IAM Identity Management that guarantees the security of all access, applications and data is one of the most important strategic decisions that will reduce costs and risks, increasing the productivity of the entire company. After all, how do you ensure that all users in your organization have only the appropriate levels of access, applications, data and transactions? In addition, the IAM Identity Management platform can be integrated with the main Human Resources systems, synchronizing information and performing tasks vital to the smooth running of the business. The entire history of people's rights to the systems is managed, from the first access, at the time of admission, until the revocation of rights at the end of the link.