Business Software for Active Directory

Top Software that integrates with Active Directory

  • 1
    Sophos Intercept X for Mobile Reviews
    Intercept X for Mobile safeguards users, their devices, and corporate information from both familiar and novel mobile threats by utilizing our industry-leading deep learning engine, Intercept X. This solution is effortlessly managed via Sophos Central, which integrates seamlessly with the comprehensive Sophos suite of next-generation cybersecurity measures. Sophos Intercept X for Mobile provides continuous oversight of device integrity, alerting users when a device is compromised, allowing for prompt remediation or automatic revocation of access to corporate assets. Security advisors for devices are capable of detecting jailbreaking or rooting, subsequently informing users and administrators about essential operating system updates. Positioning a robust first line of defense at the mobile network level for both Android and iOS devices, real-time analysis of network connections is conducted to identify any suspicious traits that may indicate an attack. This proactive approach significantly reduces the chances of Man-in-the-Middle (MitM) attacks. Additionally, web filtering and URL verification effectively block access to known harmful sites on mobile devices, thereby enhancing overall security. With these comprehensive features, users can feel more confident in the security of their mobile environments.
  • 2
    TestDirector Reviews

    TestDirector

    TestDirector

    €5 per user per month
    Well-crafted modules for managing tests and incidents do more than provide ease of use; they also deliver structured solutions for overseeing daily operations. All essential information is conveniently located in one spot, which contributes to significant time and cost savings. In the hustle and bustle of daily work, it’s common to feel overwhelmed by numerous tasks, leading to potential oversight of important details. The innovative Dashboard in the TestDirector environment serves as a vital tool, allowing you to maintain a clear view of your ongoing responsibilities as well as any pending issues. If you're ever uncertain about which tasks take precedence or what your supervisor urgently needs, a quick glance at the "Dashboard" will reveal everything you need to know in an instant. Furthermore, the Dashboard provides seamless access to the specifics of individual tasks, bugs, and issues, ensuring that nothing slips through the cracks. This integration of information not only boosts productivity but also enhances overall project management efficiency.
  • 3
    Acorn LMS Reviews
    Acorn AI-powered PLMS addresses the topics of performance & learning in one platform, allowing enterprises, governments and other orgs worldwide to consistently align individual growth with business objectives. With Acorn, leaders can continually assess and improve learners based on specific company and role-based capabilities. The perfect enabler for employee training, onboarding, compliance training, association learning, & more. Key features: - Impact, not overload - Deliver effective blended learning - Link learning with performance - Report in minutes not hours
  • 4
    SecureMFA Reviews

    SecureMFA

    SecureMFA

    $178.25 per year
    The OTP authentication module for Microsoft ADFS, compatible with both ADFS 2019 and ADFS 2016 servers, facilitates multi-factor authentication (MFA) through a Time-Based One-Time Password (TOTP) mechanism, adhering to RFC6238 standards. This MFA solution mandates that users input a one-time passcode generated by authenticator applications like Microsoft Authenticator, Google Authenticator, or Symantec VIP to finalize their second factor authentication during the login process. Additionally, it allows for self-registration via QR codes using free mobile apps, while securely storing OTP data in Microsoft Active Directory attributes or MS SQL Server. Encryption of QR secrets is implemented using AES 256-bit technology, enhancing security further. The configuration also includes specifying network locations (both IPv4 and IPv6) from which users can scan the QR code, and it supports trust relationships across multiple ADDS forests, making it a highly versatile security solution. With these features, organizations can effectively bolster their security protocols and ensure a robust authentication process.
  • 5
    Delinea Secret Server Reviews
    Safeguard your essential accounts using our advanced Privileged Access Management (PAM) solution, which can be deployed either on-premise or in the cloud. Experience rapid implementation with our offerings that include privileged account discovery, easy installation, and comprehensive auditing and reporting features. Effectively oversee numerous databases, software solutions, hypervisors, network devices, and security systems, even in extensive, distributed settings. Benefit from unlimited customizations with direct management capabilities for both on-premise and cloud PAM environments. Collaborate with our professional services team or utilize your in-house experts for optimal results. Protect privileges for service, application, root, and admin accounts throughout your organization to maintain robust security. Keep privileged credentials securely stored in an encrypted, centralized vault and identify all relevant accounts to mitigate sprawl while achieving complete visibility into your privileged access landscape. Ensure efficient provisioning and deprovisioning, maintain password complexity standards, and regularly rotate credentials to enhance security measures. Additionally, our solution offers seamless integration with existing systems, allowing for a more cohesive security strategy across your enterprise.
  • 6
    DataSpider Servista Reviews
    DataSpider Servista boasts compatibility with over 80 adapters tailored for prominent data sources. It seamlessly integrates IBM Notes, kintone, Salesforce, and your preferred SAP applications, ensuring they function together as needed. The system adheres to established protocols without altering any existing frameworks. For instance, when establishing a connection with Salesforce, DataSpider Servista complies with all requisite Salesforce standards. Simply enter the connection details, configure your data acquisition, and DataSpider Servista begins its operation—connecting to Salesforce requires just these two straightforward steps. Additionally, it interfaces effortlessly with major cloud platforms such as Microsoft Azure and Amazon Web Services. We also stay updated on the latest offerings in services and applications, allowing us to deliver the most sought-after connecting adapters. DataSpider Servista demonstrates remarkable adaptability across various databases, protocols, and file types. Furthermore, it's just as simple to terminate or redirect a connection using an adapter, making it a user-friendly solution for data integration challenges. This versatility ensures that users can navigate their data landscape with ease and efficiency.
  • 7
    Dossiere Reviews
    Dossiere is an advanced electronic platform designed to securely manage access to board, executive, and sensitive documents. Its exceptional document security features enable users to effortlessly view, annotate, share, and collaborate on vital papers in a streamlined manner. With Dossiere, organizing and distributing meeting agendas becomes a straightforward and efficient task. Users can schedule meetings, create agendas, and upload necessary documents for attendees to examine and provide feedback on prior to the meeting. This platform allows teams to engage in secure collaboration, sharing insights and comments with one another. Documents can be compiled and accessed safely for pre-meeting reviews, ensuring that all participants are well-prepared. Dossiere empowers users with control over the interaction and collaboration around various formats, including documents, videos, and audio files that are sent directly to their devices. Users can simultaneously view images, videos, and audio while going through related documents, enhancing the overall experience. Furthermore, it enables the creation of document annotations as well as timeline markers for audio and video content, making it a comprehensive tool for effective collaboration. Ultimately, Dossiere redefines the way teams work together, ensuring that all materials are readily available and easily manageable.
  • 8
    VShell Server Reviews
    Secure file transfer across multiple protocols ensures that data remains protected during transit. It offers remote management capabilities and is compatible with Windows, Linux, and Mac operating systems. The secure file transfer server safeguards information with support for protocols such as SSH2, SFTP, FTPS, and HTTPS. Users and groups can benefit from detailed access control, while remote administration is facilitated through SSH2. The setup process is straightforward, allowing for immediate functionality without extensive configuration. Seamlessly integrating with Windows Active Directory and LDAP, it provides enterprise-level reliability that users can trust without constant oversight. The software is designed to work with clients adhering to open standards for SSH2, SFTP, FTPS, or HTTPS. With its multi-platform capabilities, it operates efficiently on physical servers, virtual machines, and in cloud environments. Licensing is based on connection usage, making it a cost-effective choice for businesses. The support team is dedicated and highly skilled, ensuring prompt assistance begins even during the evaluation phase. Furthermore, administrators can manage access to VShell services for users or groups, allowing for granular permissions tailored to organizational needs. This flexibility in access management enhances security and usability for diverse user requirements, ultimately leading to improved operational efficiency.
  • 9
    Virtual Slate Reviews

    Virtual Slate

    Lingel Learning

    $2189/annum
    Are you interested in hosting online courses? Virtual Slate can help your business, no matter how big or small. Virtual Slate is backed by a Moodle Partner (Lingel Learning), and you can be sure to trust them. Virtual Slate provides all the tools you need for offering online courses. Virtual Slate handles everything from hosting to custom branding, making your users' experience exciting and educational. Virtual Slate also offers other features, such as: -My Learning Dashboard -Quicklink Tiles -Learning Pathways -Team Management Event Management -Custom Certificates -Course Catalogue -Course Ratings -CPD Dashboard Advanced Reporting, Advanced Enrolment, and Email Notifications are just a few of the additional features. You have everything you need to provide your learners with a state-of-the-art program and guide them to success.
  • 10
    NextGen SSO Reviews
    Introducing an advanced SSO solution designed to safeguard both internal and cloud-based applications while minimizing costs, enhancing user satisfaction, and offering extensive integration capabilities with various SSO platforms. This NextGen Cloud SSO SaaS product is not a multi-tenant or shared service, and can be implemented within minutes. It features a tiered pay-as-you-go pricing model with affordable flat fees, complimentary multi-factor authentication, and outstanding round-the-clock support. The solution ensures highly secure authentication alongside numerous integration options with other SSO systems, enabling smooth single sign-on functionality across both on-premises and cloud applications. Additionally, it comes with ready-to-use support for mobile applications and is built on standards compliant with LDAP versions 2 and 3. High availability and disaster recovery functionalities are included as standard features. As a dedicated SSO software development firm, we assist organizations in enhancing web security, safeguarding essential applications, and thwarting cyber threats while prioritizing an exceptional user experience for employees and partners alike. Our focus is on delivering innovative security solutions that adapt to the evolving digital landscape.
  • 11
    ATTACK Simulator Reviews
    The ATTACK Simulator enhances your security framework by mitigating the chances of data breaches, empowering your staff to safeguard customer information, and ensuring adherence to global cyber security standards. In light of the present global circumstances, it is crucial to prioritize Security Awareness Training with ATTACK Simulator now more than ever. Malicious actors exploit the ongoing pandemic and evolving workplace dynamics to target vulnerable individuals and organizations. Engaging in online business carries inherent security threats that cannot be overlooked. By implementing timely and effective measures, you can protect yourself from potential cyberattacks. With ATTACK Simulator's automated training program, your employees will stay informed about security best practices, alleviating your concerns. Cyber security training is invaluable for anyone utilizing technology in today's digital landscape, as it equips individuals with the knowledge to navigate potential threats effectively. Ultimately, fostering a culture of security awareness within your organization is essential for long-term protection against cyber risks.
  • 12
    OpenText SOCKS Reviews
    OpenText™ SOCKS Client is a security solution certified for Windows® that facilitates connections to hosts through firewalls. It enables organizations to enforce security protocols without necessitating alterations to enterprise applications, allowing legitimate external host access through straightforward, centrally managed rule-based configurations. Utilizing the SOCKS industry-standard security protocol, including SOCKS5, this client permits computers on one network to communicate with hosts on another via a proxy. Firewalls often impose strict limitations on IP data traffic, which can create difficulties for applications that do not utilize commonly used IP ports, such as those for mail and remote access. To maintain the effectiveness and security of firewalls while ensuring IP access to services located behind them, organizations need a reliable solution. The SOCKS Client meets this need by providing a seamless, secure connection to external networks without compromising firewall integrity.
  • 13
    Perspective VMS Reviews
    Perspective VMS® is an innovative web-based application designed to stream and record video from IP security cameras while also managing a variety of security devices. This software boasts a range of capabilities, including fleet security oversight, access control, advanced video analytics, as well as intrusion detection and prevention systems, alongside managing gates, barriers, RFID assets, and IoT sensors. With a focus on behavior and movement tracking, PVMS ensures thorough monitoring throughout an entire facility. The Standard Edition of Perspective VMS® introduces numerous enhanced features, making it suitable for medium-scale projects that require centralized management across multiple sites while remaining budget-friendly. Additionally, it includes access control integration for third-party applications. On the other hand, the Professional Edition of Perspective VMS® offers even more sophisticated features tailored for larger projects, with some limitations on access control integration and optional video analytics. This tiered approach allows organizations to select the edition that best meets their specific needs and project scale. Ultimately, Perspective VMS® is designed to adapt to the diverse requirements of security management across different environments.
  • 14
    BarCloud Reviews
    BarCloud offers a robust and intuitive Inventory Management Solution that is highly adaptable and customizable. Its modular design allows us to address the specific needs of organizations of varying sizes effectively. Regardless of whether you prefer an On-Premise or a Cloud-Based Solution, our software provides a wide range of transactions, many of which are exclusive to BarCloud. Additionally, it features numerous powerful system configurations, enabling users to manage and monitor assets and inventory across multiple divisions seamlessly from a single, user-friendly platform. This versatility ensures that every organization can optimize their inventory management processes efficiently.
  • 15
    CostLens Reviews

    CostLens

    Amalytics Software

    These cost algorithms create cost relationships between your IT infrastructure and service data, procurement data, and financial data enriched by external datasets. An intuitive user interface is user-friendly and allows for easy navigation, user permissions, and clear visuals. To improve the accuracy of your IT cost analysis, align to industry standards to allow for easy benchmarking. CostLens is a cost-effective tool that helps you make informed investment decisions. Single-sign-on capabilities allow users to connect with third-party systems easily. SplitLink, a unique framework, is aware of cost metadata and automatically creates end-to-end cost relationships at low levels of detail. This allows you to quickly identify and drill down on problems.
  • 16
    Hyperfish Reviews
    Hyperfish ensures that profile information remains accurate and current within Office 365 and the contemporary workplace. By revitalizing your company directory, Hyperfish guarantees that all directory and profile details are consistently complete and timely. This tool enhances IT service efficiency, boosts employee involvement, and maximizes the benefits of your technological investments. Hyperfish identifies gaps or inaccuracies and initiates conversations with employees to gather and confirm their information effectively. Using advanced AI and bot technologies, it streamlines the process of collecting profile data. The platform offers secure support for on-premises, hybrid, and cloud-based environments. Additionally, Hyperfish monitors Active Directory to pinpoint missing or erroneous information, subsequently notifying users via email or chatbots. Employees can conveniently update their details through both desktop and mobile devices. By automatically reaching out to users based on identified discrepancies, Hyperfish ensures that profile updates are conducted seamlessly and efficiently. This proactive approach not only saves time but also fosters a culture of accurate data management within the organization.
  • 17
    Scalix Reviews
    Enhance your Outlook experience through features like push email, personal information management, group scheduling, availability services, public folders, delegation, and additional functionalities. By utilizing fewer servers and attractive subscription models, you can boost your profit margins effectively. Furthermore, cut down on licensing expenses while capitalizing on your team's current expertise by adopting a Linux-based system. Scalix offers starter packs that serve as comprehensive, single-server messaging solutions tailored for smaller enterprises and organizations, delivering a complete suite of email and collaboration tools. The Scalix small business edition is specifically crafted for small enterprises, providing a rich array of business capabilities, including the ability to quickly recover deleted user-specific items, support for mobile devices, and various other essential features. This solution not only facilitates efficient communication but also empowers businesses to operate seamlessly in a competitive landscape.
  • 18
    Zilla Security Reviews
    Zilla empowers security teams with the necessary visibility and automation to maintain the security and compliance of cloud applications effectively. By utilizing Zilla, you can confidently verify that your application security configurations are accurate, permissions are suitable, and that API-based integrations are safeguarded against potential data leaks. As the cloud footprint continues to grow, the complexity of data interactions also increases. Therefore, implementing automated access reviews becomes essential to ensure that both users and API integrations are granted appropriate access. The reliance on cumbersome spreadsheets or intricate identity governance solutions requiring costly professional service engagements is becoming outdated. With automated collectors, it’s effortless to gather permission data from all your cloud services and on-premises systems as needed, streamlining the compliance process. This approach not only enhances security but also saves valuable time and resources for security teams.
  • 19
    TwinThread Reviews

    TwinThread

    TwinThread

    $200 per month
    Transform your equipment data to competitive advantage. This technology is used on more than 1 million assets. The most advanced predictive operations technology is available to power your continuous improvement. The production environment of today is more complex and interconnected than ever before. Your plant floor generates an inordinate amount of data, from increasingly sophisticated PLC technology to the ever-expanding IIoT world. It can be difficult to distinguish the meaningful information from the noise when there is so much information coming in from business, supply chain, and financial systems. TwinThread enables you to transform data from any source into actionable and impactful positive results. Our predictive operations platform was built from the ground up to increase operational efficiency, reduce costs, improve consistency, and increase throughput. As bold as it sounds, our mission is to achieve 100% plant efficiency.
  • 20
    Access Auditor Reviews

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 21
    Incident IQ Reviews
    IncidentIQ is committed to supporting teaching, learning and asset management by transforming technology support, asset administration and services delivery to meet today's needs of K-12 schools. IncidentIQ is digitizing service delivery in K-12 schools to empower teachers, students, and support staff. IncidentIQ is revolutionizing how school districts offer and manage services, from help desk ticketing to IT asset management and maintenance work orders. Get learning devices into students' hands quickly. You can quickly check out devices. You can track previous ownership and storage location. Asset management tools for enterprises, designed to handle the complexity of today's K-12 technology. Asset management software allows you to keep track of important asset information in real time. This software reduces administrative costs, streamlines the service management process, and gives you greater visibility into asset usage.
  • 22
    Asgardeo Reviews
    Asgardeo simplifies the process of incorporating secure authentication flows into applications through a few straightforward steps. It allows for seamless integration with single-page applications, traditional web applications, and mobile platforms. The solution includes SDKs that support a variety of technology stacks, making it versatile for developers. Users can implement social sign-ins with major platforms like Google, Facebook, and GitHub using ready-made templates, with plans for additional options in the future. The system allows for the configuration of external identity providers that connect via established protocols such as OpenID Connect and SAML. Administrators can efficiently manage their customers, employees, and partners using the default onboarding and management workflows provided. Asgardeo also gives the choice to utilize its own directory service or connect to existing LDAP or Active Directory systems through an agent. For two-factor authentication, developers can select from multiple methods, including Email OTP, SMS OTP, and TOTP, ensuring a high level of security. Users can define intricate multi-step processes and tailor configurations to meet specific user needs. By leveraging Asgardeo, developers can enhance the overall user experience by concentrating on business logic while ensuring that login and secure access are reliably maintained for end-users. This comprehensive approach not only streamlines the authentication process but also fortifies the security framework within applications.
  • 23
    ThinkData Works Reviews
    ThinkData Works provides a robust catalog platform for discovering, managing, and sharing data from both internal and external sources. Enrichment solutions combine partner data with your existing datasets to produce uniquely valuable assets that can be shared across your entire organization. The ThinkData Works platform and enrichment solutions make data teams more efficient, improve project outcomes, replace multiple existing tech solutions, and provide you with a competitive advantage.
  • 24
    Clarify Reviews

    Clarify

    Clarify

    €49 per month
    Transform the way your workforce engages with data from historians, SCADA, and IoT devices, tailoring insights for everyone from field personnel to data analysts. Dive into your data like never before with a comprehensive platform that allows for integration, organization, collaboration, and visualization of industrial information all in one place. Effortlessly navigate and visualize numerous data signals simultaneously while maintaining clarity and performance through our innovative streaming data timeline technology. Initiate discussions or report incidents by tagging team members directly within the data timeline, enhancing communication and context by including media such as images and videos. Access historical activities to prevent redundant problem-solving, ensuring efficiency in your operations. Our robust permission system guarantees that your data remains accessible solely to you, while developer-friendly documentation and secure APIs facilitate safe and straightforward interactions. Whether you are at your desk, on a tablet, or using a mobile phone, our platform is optimized for all modern browsers, and you can also carry industrial data with you wherever you go through our dedicated mobile applications. This approach not only streamlines operations but also fosters a culture of continuous learning and collaboration among your teams.
  • 25
    Crystal Alarm Reviews

    Crystal Alarm

    Crystal Alarm

    $4 per user per month
    Crystal Alarm is a personal alarm app that can be used for professional purposes. It is available on Android and iPhone. You can quickly send alarms to colleagues and an alarm central. Crystal Alarm is the best personal alarm for your business. Personal Alarm features many innovations to improve safety for lone workers and personnel at risk in threatening situations. Crystal Alarm was launched in 2012 and is constantly evolving. Safety for solo workers A timer alarm can be activated by a single worker and continuous positioning will be sent. Alarm for an emergency Panic alarm function with Bluetooth accessory. Safe Return Home Employees can acknowledge their safe return home. This is ideal for personnel who are not able to visit the office after a day of work. Positioning Positioning with great accuracy outdoors via GPS and indoors via various positioning systems. Background audio The alarm central allows you to hear what is happening in the event that an alarm goes off.
MongoDB Logo MongoDB