Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
                
            
        
            Description
                    Ensure your business, customers, and employees are safeguarded with our top-tier identity security, which is grounded in a zero-trust approach. In the realm of data protection, passwords represent the most significant vulnerability. This is precisely why multifactor authentication has emerged as the gold standard in identity and access management, effectively thwarting unauthorized entry. With SecureKi, you can confidently verify the identities of all users. Often, compromised access and credentials serve as primary entry points for security breaches. Our extensive privileged access management solution is meticulously crafted to oversee and manage privileged access to various accounts and applications, providing alerts to system administrators regarding high-risk activities, simplifying operational tasks, and ensuring seamless compliance with regulatory standards. Notably, privilege escalation remains central to numerous cyber-attacks and system weaknesses. By implementing our solutions, you can significantly enhance your organization's security posture while fostering trust among your stakeholders.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    Active Directory
            
            
        
        
    
        
        
            
                
    Azure Marketplace
            
            
        
        
    
        
        
            
                
    Fixify
            
            
        
        
    
        
        
            
                
    Google Workspace
            
            
        
        
    
        
        
            
                
    HivePro Uni5
            
            
        
        
    
        
        
            
                
    Microsoft 365
            
            
        
        
    
        
        
            
                
    Microsoft Exchange
            
            
        
        
    
        
        
            
                
    Notus
            
            
        
        
    
        
        
            
                
    Runbook Studio
            
            
        
        
    
        
        
            
                
    StrikeReady
            
            
        
        
    
                
                    
    
        
        
        
    
                
            Integrations
            
                
    Active Directory
            
            
        
        
    
        
        
            
                
    Azure Marketplace
            
            
        
        
    
        
        
            
                
    Fixify
            
            
        
        
    
        
        
            
                
    Google Workspace
            
            
        
        
    
        
        
            
                
    HivePro Uni5
            
            
        
        
    
        
        
            
                
    Microsoft 365
            
            
        
        
    
        
        
            
                
    Microsoft Exchange
            
            
        
        
    
        
        
            
                
    Notus
            
            
        
        
    
        
        
            
                
    Runbook Studio
            
            
        
        
    
        
        
            
                
    StrikeReady
            
            
        
        
    
                
                    
    
        
        
        
    
                
            Pricing Details
        $595.00 / year
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Zoho
Founded
1996
Country
India
Website
www.manageengine.com/active-directory-360/tp/identity-and-access-management-solution.html
Vendor Details
Company Name
SecureKi
Founded
2015
Country
Malaysia
Website
www.secureki.com
Product Features
Customer Identity and Access Management (CIAM)
                                        Access Certification
                                        
                                    
                                    
                                    
                                        Access Management
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Automatic User/Device Recognition
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Multi-Factor Authentication (MFA)
                                        
                                    
                                    
                                    
                                        Privacy / Consent Management
                                        
                                    
                                    
                                    
                                        Real Time Notifications
                                        
                                    
                                    
                                    
                                        Self-Service Portal
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        User Provisioning
                                        
                                    
                            
                        Data Governance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Data Discovery
                                        
                                    
                                    
                                    
                                        Data Mapping
                                        
                                    
                                    
                                    
                                        Data Profiling
                                        
                                    
                                    
                                    
                                        Deletion Management
                                        
                                    
                                    
                                    
                                        Email Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Process Management
                                        
                                    
                                    
                                    
                                        Roles Management
                                        
                                    
                                    
                                    
                                        Storage Management
                                        
                                    
                            
                        GDPR Compliance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Consent Management
                                        
                                    
                                    
                                    
                                        Data Mapping
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        PIA / DPIA
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Sensitive Data Identification
                                        
                                    
                            
                        HIPAA Compliance
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Documentation Management
                                        
                                    
                                    
                                    
                                        For Healthcare
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Policy Training
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vendor Management
                                        
                                    
                            
                        Identity Management
                                        Access Certification
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Privileged Account Management
                                        
                                    
                                    
                                    
                                        Self-Service Access Request
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        User Provisioning
                                        
                                    
                            
                        PCI Compliance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Exceptions Management
                                        
                                    
                                    
                                    
                                        File Integrity Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Log Management
                                        
                                    
                                    
                                    
                                        PCI Assessment
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                            
                        Privileged Access Management
                                        Application Access Control
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        For MSPs
                                        
                                    
                                    
                                    
                                        Granular Access Controls
                                        
                                    
                                    
                                    
                                        Least Privilege
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Remote Access Management
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        Self-Service Password Reset (SSPR)
                                        Access Control
                                        
                                    
                                    
                                    
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Employee Directory
                                        
                                    
                                    
                                    
                                        Group Passwords
                                        
                                    
                                    
                                    
                                        Password Database
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Reminders
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication (2FA)
                                        
                                    
                            
                        Single Sign On
                                        Biometric
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Identity Federation
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Social Sign On
                                        
                                    
                                    
                                    
                                        User Management
                                        
                                    
                            
                        Product Features
Privileged Access Management
                                        Application Access Control
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        For MSPs
                                        
                                    
                                    
                                    
                                        Granular Access Controls
                                        
                                    
                                    
                                    
                                        Least Privilege
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Remote Access Management
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                         
        