Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
AWS Directory Service for Microsoft Active Directory, commonly referred to as AWS Managed Microsoft Active Directory (AD), allows your directory-capable applications and AWS services to seamlessly utilize a managed version of Active Directory within AWS. This service is based on genuine Microsoft AD technology and eliminates the need for data synchronization or replication from your on-premises Active Directory to the cloud. Users can leverage standard Active Directory administrative tools and utilize inherent features like Group Policy and single sign-on. With AWS Managed Microsoft AD, integrating Amazon EC2 and Amazon RDS for SQL Server instances into your domain becomes straightforward, along with the ability to utilize AWS End User Computing (EUC) offerings such as Amazon WorkSpaces for AD users and groups. This service facilitates the migration of applications dependent on Active Directory and Windows-based workloads to the AWS environment. Additionally, AWS Managed Microsoft AD enables the application of Group Policies for managing EC2 instances while effectively supporting AD-dependent applications hosted in the AWS Cloud. Ultimately, this solution simplifies enterprise operations by providing a robust and scalable directory service in the cloud.
Description
Business interruptions or system failures caused by expired or invalid digital certificates can be significant. You have the opportunity to assess CertHat Tools for Microsoft Active Directory Certificate Services (AD CS) during a free trial that lasts for 30 days, allowing you to make an informed decision regarding a potential purchase. If you choose to buy a full CertHat license, transitioning from your trial version to a production setup is straightforward; you simply need to input a valid license key into the software. Additionally, there is a free basic version of CertHat Tools available for Microsoft PKI. CertHat Essentials serves as a valuable resource for PKI managers, aiding them in effectively monitoring and managing certificates. With CertHat Essentials, users can access essential functionalities to streamline their certificate management processes and enhance overall security.
API Access
Has API
API Access
Has API
Integrations
AWS App Mesh
AWS Client VPN
AWS Hybrid Cloud
Active Directory
Active Roles
Amazon EC2
Amazon RDS
Amazon Web Services (AWS)
Amazon WorkDocs
Amazon WorkSpaces
Integrations
AWS App Mesh
AWS Client VPN
AWS Hybrid Cloud
Active Directory
Active Roles
Amazon EC2
Amazon RDS
Amazon Web Services (AWS)
Amazon WorkDocs
Amazon WorkSpaces
Pricing Details
$0.018
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Amazon
Founded
1994
Country
United States
Website
aws.amazon.com/directoryservice/
Vendor Details
Company Name
ProMDM
Founded
2013
Country
Croatia
Website
certhat.com
Product Features
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning