6 Integrations with Netwrix Identity Recovery
View a list of Netwrix Identity Recovery integrations and software that integrates with Netwrix Identity Recovery below. Compare the best Netwrix Identity Recovery integrations as well as features, ratings, user reviews, and pricing of software that integrates with Netwrix Identity Recovery. Here are the current Netwrix Identity Recovery integrations in 2026:
-
1
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
2
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
3
Netwrix Auditor
Netwrix
Netwrix Auditor is an IT audit software solution designed to provide visibility into user activity and system changes across IT environments. It helps organizations track who is accessing data, what actions are being taken, and when those actions occur. The platform monitors systems such as Active Directory, file servers, Microsoft 365, databases, and network devices. It provides real-time alerts to notify teams of suspicious activity or potential security risks. Netwrix Auditor also helps identify excessive permissions and other vulnerabilities that could lead to data breaches. The solution includes built-in reports that support compliance with standards like HIPAA, PCI, and SOX. It simplifies audit processes by automating data collection and reporting tasks. By centralizing audit data, it helps organizations improve security and respond to incidents faster. -
4
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
5
Microsoft Hyper-V
Microsoft
Hyper-V is Microsoft's hardware virtualization product. It lets you create and run a software version of a computer, called a virtual machine. Each virtual machine acts like a complete computer, running an operating system and programs. When you need computing resources, virtual machines give you more flexibility, help save time and money, and are a more efficient way to use hardware than just running one operating system on physical hardware. Each supported guest operating system has a customized set of services and drivers, called integration services, that make it easier to use the operating system in a Hyper-V virtual machine. Hyper-V includes Virtual Machine Connection, a remote connection tool for use with both Windows and Linux. Unlike Remote Desktop, this tool gives you console access, so you can see what's happening in the guest even when the operating system isn't booted yet. -
6
VMware ESXi
Broadcom
Discover a robust, bare-metal hypervisor that installs directly onto your physical server. With direct access to and control of underlying resources, VMware ESXi effectively partitions hardware to consolidate applications and cut costs. It’s the industry leader for efficient architecture, setting the standard for reliability, performance, and support. IT teams are under constant pressure to meet fluctuating market trends and heightened customer demands. At the same time, they must stretch IT resources to accommodate increasingly complex projects. Fortunately, ESXi helps balance the need for both better business outcomes and IT savings.
- Previous
- You're on page 1
- Next