Business Software for LDAP

  • 1
    Courier Reviews

    Courier

    Double Precision, Inc.

    Free
    The Courier mail transfer agent (MTA) serves as a comprehensive mail and groupware server that utilizes widely recognized protocols, including ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. Within a unified framework, Courier delivers a range of services, such as ESMTP, IMAP, POP3, webmail, and mailing list functionalities, allowing users to easily enable or disable specific components as needed. Recently, the Courier mail server has introduced fundamental web-based calendaring and scheduling features within its webmail module, with plans for more sophisticated groupware calendaring capabilities to come shortly. Notably, the source code for the Courier mail server is designed to compile on most POSIX-compliant operating systems that utilize Linux or BSD-derived kernels, and it can also be successfully compiled on Solaris and AIX systems, provided users utilize the appropriate freeware add-on tools from Sun or IBM. The development of the Courier mail server is rooted in a combination of several interrelated projects that converged into its current form, and it also incorporates SMTP extensions specifically aimed at enhancing mailing list management functionality. In this way, Courier not only serves as a versatile mail server but also as a collaborative tool for users seeking effective communication solutions.
  • 2
    Redactive Reviews
    Redactive's developer platform eliminates the need for developers to acquire specialized data engineering expertise, simplifying the process of creating scalable and secure AI-driven applications for both customer engagement and employee productivity. Designed with the security requirements of enterprises in mind, it enables you to expedite your journey to production. There’s no need to overhaul your permission models simply because you are integrating AI into your organization. Redactive consistently honors the access controls established by your data sources, and our data pipeline is designed to avoid the storage of your final documents, thereby minimizing risks associated with downstream technology providers. With a comprehensive suite of pre-built data connectors and reusable authentication flows, Redactive seamlessly integrates with a continually expanding range of tools, complemented by custom connectors and LDAP/IdP provider integrations, ensuring that you can effectively support your AI initiatives regardless of your existing architecture. This flexibility allows businesses to innovate rapidly while maintaining robust security standards.
  • 3
    KX Delta Platform Reviews
    The KX Delta Platform, a high-performance data management system for enterprises, is designed to capture, analyze, and store real-time data and historical data. Built on kdb+ - the world's most popular time-series data base - it offers flexible configuration options to support key deployment requirements such as redundancy and load balancing. It also ensures high availability. Robust security measures, such as LDAP authorization and data encryption, ensure strict compliance to data sensitivity and security requirements. The platform allows users to visualize data using a dashboard builder and interactive data playback. It also generates reports automatically. This platform is a powerful tool for program management. It allows for the management, manipulation and exploration of large real-time and historic datasets. Processing is done at high speeds to support mission critical applications.
  • 4
    Endian Reviews
    Endian UTM is an all-encompassing Unified Threat Management (UTM) solution tailored to deliver strong network security for enterprises of any scale. It encompasses a wide range of sophisticated features, such as a stateful firewall, intrusion detection and prevention systems (IDS/IPS), antivirus and antispam measures, and VPN options (both SSL and IPsec), along with web and email content filtering and quality of service (QoS) management. Available as both hardware appliances and software installations, Endian UTM offers adaptable deployment options to fit various networking needs. The solution facilitates the management of multiple network zones (Red, Green, Orange, Blue), effectively segmenting and securing distinct areas of the network. With its user-friendly web-based interface, administrators can effortlessly adjust and oversee network security configurations, access live traffic data, and create comprehensive reports. In addition, Endian UTM boasts essential features like multi-WAN support with automatic failover, VLAN capabilities, and various integration options, enhancing its utility for modern businesses. Overall, this solution ensures that organizations can maintain a high level of security while optimizing their network performance.
  • 5
    Aranda Service Management Reviews
    Aranda Service Management is a comprehensive IT Service Management (ITSM) software that aims to boost productivity within organizations by offering automated service solutions. It adheres to ITIL 4 best practices and features a user-friendly portal alongside self-service capabilities, which allow clients to submit requests, track the status of their cases, and access a centralized knowledge repository for self-management around the clock. Key advanced features include a priority matrix, financial oversight, structured approval workflows, import/export options, and tools for collecting satisfaction feedback. By incorporating artificial intelligence and machine learning, it provides top-tier self-service experiences while simultaneously lowering support expenses. Additionally, it accommodates multi-project environments, enabling businesses to oversee various service domains beyond IT without the need for extra infrastructure, thus promoting seamless operational efficiency. This flexibility makes it an invaluable asset for organizations looking to streamline their IT and service management processes.
  • 6
    MemberProtect Reviews
    MemberProtect is tailored for professional developers to seamlessly incorporate into secure digital platforms such as ACH, Online Banking, and wire transfer systems. It stands as the most reliable framework for user authentication, data encryption, and user management within the banking and credit union sectors today. Utilizing a roles and privileges model, it accommodates millions of users and organizations while offering highly detailed application security. Its robust encryption capabilities secure databases down to the column level and extend to encrypting email communications and flat files stored across your network. Additionally, it maintains comprehensive logging, capturing even unsuccessful data access attempts, which aids in safeguarding member information against hackers and unauthorized personnel, effectively surpassing the protective measures of firewalls, SSL, and operating systems. By utilizing MemberProtect, developers can establish secure connections with third-party APIs, ensuring extensive compatibility with any web-based system, including integration with LDAP services. This comprehensive approach not only enhances security but also empowers organizations to maintain trust and compliance in a rapidly evolving digital landscape.
  • 7
    CA RFID Asset Management Reviews
    Manage and oversee your fixed assets effortlessly using a user-friendly, entirely web-based graphical interface. This application tracks every movement of your assets, providing you with insights on their location and history. Regardless of the type of sensing technology required, our platform supports both stationary and portable readers. User access can be customized based on profiles, offering either read-only or administrative privileges. Additionally, our system is compatible with LDAP for streamlined authentication. You will automatically receive alerts triggered by specific events via email or online notifications, complete with detailed information about the occurrences. This ensures you remain informed about your assets at all times.
  • 8
    PowerTerm WebConnect HostView Reviews
    In the current economic landscape, organizations can significantly boost their productivity and adaptability by effectively optimizing their IT resources. Ericom's PowerTerm® WebConnect HostView provides a solution for businesses to achieve this goal through web-to-host emulation. By utilizing the advantages of PC-client access software and server-based computing, organizations can enhance their legacy systems. This platform enables centralized management of configurations and software updates, which helps conserve both time and administrative resources. It also enhances overall productivity by allowing access to critical business applications from anywhere at any time via a standard web browser, irrespective of the user's geographical location. Furthermore, the solution leads to lower expenses related to individual licensing, maintenance, support, and updates. It also includes robust security features such as SSL, SSH, SFTP, integration with Active Directory and LDAP, and support for Single Sign-On, as well as various authentication methods like Kerberos, RADIUS, RSA® SecurID®, and SecurEnvoy® SecureAccess and SecurICE two-factor authentication. The comprehensive nature of these features ensures that organizations can safeguard their data while optimizing their operations.
  • 9
    ecotime Reviews

    ecotime

    Huntington Business Systems

    Ecotime® seamlessly integrates with your current payroll and human resources systems while offering support for active directory, LDAP, and various other third-party single-sign applications. Developed by HBS, the Ecotime® application stands out as a highly robust and adaptable workforce management solution. By leveraging both established industry practices and cutting-edge technologies, Ecotime® ensures top-tier performance. This system is fully scalable, accommodating businesses ranging from just 39 employees to massive organizations with up to 250,000 staff members, thereby allowing it to evolve alongside your company’s needs and is already in use across diverse sectors. Furthermore, Ecotime® empowers all employees by providing them with the flexibility to choose the most suitable method for entering their time based on their individual work circumstances. This adaptability is a key feature that enhances user experience and operational efficiency.
  • 10
    CallBroker Report View Reviews
    CALLBROKER Report View is a server-based application that empowers communications administrators or managers to evaluate and understand their organization's call flow. Tailored to enhance the experience of Cisco Unified Communications users, this reporting tool imposes no restrictions on the number of IP phones or calls, ensuring that communications managers have critical resources to swiftly analyze and effectively make decisions regarding organizational communications. With a web-based interface, CALLBROKER Report View enables detailed oversight of both internal and external call traffic. Specifically designed for call centers, it delivers insights into agent performance and queue statistics, along with a comprehensive array of data that fulfills the needs of any customer relationship management system, including metrics on answered calls, abandoned calls, talk durations, waiting times, and average wait durations. Furthermore, it integrates seamlessly with Cisco CUCM through AXL or LDAP and provides features such as email alerts and the capability to export reports in PDF and Excel formats, thereby facilitating enhanced operational efficiency and decision-making processes. The versatility and depth of analysis provided by CALLBROKER Report View make it an invaluable asset for organizations looking to optimize their communication strategies.
  • 11
    SecureIdentity MFA Reviews
    A simple password and username approach is not enough to protect your business' sensitive data. Your private data is vulnerable to attack if log-ins are compromised in a matter of minutes. SecureIdentity provides information about the identity, device, and data of each user. This allows you to prove who is doing what at all times. MFA is the best option for privacy and layered data security. Our MFA solution integrates seamlessly into Microsoft's Active Directory or other LDAP solutions. This allows you to reutilize existing authentication database infrastructure without having to re-architect and deploy, backup, and manage a secondary user base. We believe that users should be able choose any device they want to use as their authentication token. This could be their phone, tablet, laptop, or desk phone.
  • 12
    S-Filer Portal Reviews
    S-Filer Portal™ offers a comprehensive on-premise solution tailored to cater to the secure file transfer, storage, and sharing needs of both large and small organizations. This platform encompasses features typically present in more costly Managed Secure File Transfer (MFT) and Enterprise File Sharing and Synchronization (EFSS) solutions. Designed specifically for enterprise applications, S-Filer Portal surpasses personal file-sharing alternatives in terms of security and manageability. Files are securely stored in encrypted virtual vaults utilizing AES 256 encryption, with secure transfers facilitated through SSL/TLS protocols and optional end-to-end encryption. Additionally, the system boasts seamless integration with Active Directory and LDAP, enabling Single Sign-On for internal users, while external user management and authentication occur within distinct authentication domains. The robust architecture of S-Filer Portal ensures that organizations can confidently address their file transfer and sharing requirements.
MongoDB Logo MongoDB