Business Software for Microsoft Entra ID

Top Software that integrates with Microsoft Entra ID

  • 1
    Acadia Reviews

    Acadia

    Systems Alliance, Inc.

    Acadia meets your team at the frontline, providing on-the-job guidance where and when it’s needed. Acadia is the Connected Worker Platform designed for Employee Productivity. Our web-based platform makes it easy for you to standardize policies and procedures and put them in the hands of your frontline employees, no matter where they work. Incorporate videos, images, and other job aids to support precision execution. Ensure your team can execute critical tasks accurately, every time. Quantify individual and team performance with dynamic reporting. Acadia makes it easy to track compliance and see where you have gaps on the team. You can ditch the spreadsheet and see your entire team’s capabilities in an instant with our skills tracking matrix. Empower employees with all the tools they need to do their work – whether they’re on the factory floor, in the back office, or out in the field. Acadia clients use our digital work instructions to improve employee productivity, hit work efficiency goals, and create consistency in the workplace. See returns across a spectrum of operational outcomes when you build your employees’ capabilities.
  • 2
    LUIS Reviews
    Language Understanding (LUIS) is an advanced machine learning service designed to incorporate natural language capabilities into applications, bots, and IoT devices. It allows for the rapid creation of tailored models that enhance over time, enabling the integration of natural language features into your applications. LUIS excels at discerning important information within dialogues by recognizing user intentions (intents) and extracting significant details from phrases (entities), all contributing to a sophisticated language understanding model. It works harmoniously with the Azure Bot Service, simplifying the process of developing a highly functional bot. With robust developer resources and customizable pre-existing applications alongside entity dictionaries such as Calendar, Music, and Devices, users can swiftly construct and implement solutions. These dictionaries are enriched by extensive web knowledge, offering billions of entries that aid in accurately identifying key insights from user interactions. Continuous improvement is achieved through active learning, which ensures that the quality of models keeps getting better over time, making LUIS an invaluable tool for modern application development. Ultimately, this service empowers developers to create rich, responsive experiences that enhance user engagement.
  • 3
    Viibrant Reviews
    Viibrant Core is an adaptable technology platform designed exclusively for senior living communities. Our intuitive system enhances both resident interaction and the efficiency of staff workflows. By simplifying various community operations, including dining reservations, event sign-ups, and service requests, Viibrant Core ensures seamless management. All community information can be centralized and easily controlled from one location. The dashboard is tailored to showcase specific functionalities according to the different roles of administrators. Additionally, we offer numerous integrations with partners such as TheWorxHub, FullCount CARDWATCH, MatrixCare, PointClickCare, and Azure Active Directory. Furthermore, we deliver real-time analytics that monitor usage and activities at both community and resident levels, allowing for informed decision-making and improved service delivery. This comprehensive system is designed to enhance the overall experience for both residents and staff alike.
  • 4
    ML Schedules Reviews

    ML Schedules

    MasterLibrary.Com

    Revolutionary event scheduling software designed specifically to meet the rigorous demands of educational institutions. This comprehensive tool enables seamless and efficient management of facility use requests, all while avoiding the exorbitant costs associated with other programs. Ensure all departments stay informed with up-to-date event schedules that incorporate both setup and support requirements. Experience a significant reduction in request processing times, cutting them down from days to mere minutes through user-friendly processes and forms. Achieve a reduction in processing labor by over 50% in just a few weeks, while also benefiting from lower software subscription fees. Collect essential data and apply accurate charges for the use of requested spaces, ensuring financial precision. Automatically alert custodial and IT personnel when their services are required for setup or support, enhancing operational efficiency. Effortlessly integrate with existing K12 online payment systems, allowing for smooth financial transactions. Monitor request and payment statuses through intuitive dashboards and reports, providing clear visibility. Identify scheduling conflicts quickly and eliminate the hassle of manual availability checks for spaces. Furthermore, execute bulk updates across your entire calendar for all groups with a single click, streamlining event management even further. With these features, educational institutions can significantly enhance their operational workflows and improve their facility management processes.
  • 5
    Refresh Reviews
    You don't need to use multiple tools for your engagement, communication, or wellness needs. All of these can be done on one platform. Your users will deal with a variety of apps and tools that are not intended for the same purpose. This can lead to confusion and lower engagement. You need a platform for wellness, communication, engagement, and challenges that organizes, integrates and communicates all of your services and benefits, regardless of how they change over time. Our modular, customizable platform for employees highlights and delivers tools based upon each user's specific needs, decreasing clutter, increasing utilization, providing a better experience and overall quality.
  • 6
    ManageEngine Identity Manager Plus Reviews
    A secure, single sign-on (SSO) solution for enterprises. ManageEngine's Identity Manager Plus, the IT division at Zoho, allows end users to access the applications they need in one click. IT administrators can also manage and monitor application access using a single console. Users can gain secure, one-click access for enterprise applications. To access all their applications, users only need to log in once. Allow SSO to hundreds popular applications from our app catalog, or any SAML-based internal app using custom integrations. Track who accessed which application, when, and from what source. Find out which applications are most used, inactive users, etc. You can import users directly from G Suite or Azure AD. Or you can use the Zoho Directory built-in to onboard contractors and temporary employees. You can configure SSO for applications, add users and enable application access to users. You can also track application access from one central console.
  • 7
    Hyperproof Reviews
    Hyperproof automates repetitive compliance operations so your team can concentrate on the bigger issues. Hyperproof also has powerful collaboration features that make it simple for your team to coordinate their efforts, gather evidence, and work directly alongside auditors from one interface. There is no more uncertainty in audit preparation or compliance management. Hyperproof gives you a complete view of your compliance programs, including progress tracking, program monitoring, and risk management.
  • 8
    ServiceNow Vaccine Management Reviews
    The Vaccine Administration Management application from ServiceNow® empowers various organizations, including healthcare providers and governmental bodies, to effectively design and oversee vaccination initiatives. Individuals receiving vaccinations can access a self-service portal to give privacy consent and consult the knowledge base or Virtual Agent for frequently asked questions, as well as self-schedule their appointments after completing an eligibility questionnaire. Healthcare providers have the capability to arrange appointments for groups of qualified individuals, send notifications to citizens and patients, carry out vaccination procedures, and keep track of vaccination-related tasks. The platform also allows users to request, reschedule, or cancel appointments, gather essential pre-vaccination data along with privacy consent, and send email reminders about upcoming appointments, all while ensuring a smooth and organized vaccination process. Additionally, the application enhances operational efficiency by streamlining communication between providers and recipients, making it easier to manage vaccine distribution effectively.
  • 9
    e4enable Reviews
    Introducing a coaching platform that utilizes data to establish, enhance, and assess sales performance effectively. By centering sales competencies in every coaching dialogue, it allows for quick identification of skill gaps, facilitates improvements in both abilities and performance, and provides a comprehensive overview of outcomes—all within a single platform. e4enable aims to revolutionize your sales organization by clearly defining what success looks like and fostering the right sales mindset from the outset. This innovative tool ensures accountability among both sales professionals and leaders, promoting the adoption of training while offering complete transparency throughout the organization. Moreover, it aligns competencies with essential sales KPIs and metrics, enabling a thorough evaluation of the effectiveness of your sales coaching and training initiatives, thereby enhancing overall sales performance. With e4enable, organizations can expect to not just meet, but exceed their sales goals by implementing a robust framework for continuous improvement.
  • 10
    Secureframe Reviews
    Secureframe simplifies the path to SOC 2 and ISO 27001 compliance for organizations, ensuring a smart approach to security as they grow. Achieve SOC 2 readiness in just weeks instead of months, eliminating the confusion and unexpected hurdles often associated with the process. We are committed to making best-in-class security transparent throughout, with straightforward pricing and a well-defined process so you always know what to expect. Time is precious, and that's why we eliminate the hassle of gathering vendor data and manually onboarding employees by automating countless tasks for you. Our user-friendly workflows allow your staff to onboard themselves effortlessly, significantly saving you valuable time. Maintaining your SOC 2 compliance is simple with our timely alerts and reports that inform you of any critical vulnerabilities, allowing for swift resolution. We provide comprehensive guidance for addressing each issue, ensuring you can rectify problems correctly. Furthermore, our dedicated team of security and compliance experts is readily available, with a commitment to responding to inquiries within one business day or less. Partnering with us not only enhances your security posture but also allows you to focus on your core business operations without the compliance burden.
  • 11
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 12
    The Cloud Connectors Reviews
    We provide cloud integration solutions that seamlessly connect systems, data, and individuals to enhance Human Capital Management (HCM) processes. Our integration Platform as a Service (iPaaS), known as Connect Every Ware!, offers an intuitive user experience and adheres to the highest industry security standards. This fully web-based iPaaS is specifically tailored for the HCM sector, ensuring ease of use. Features like two-factor authentication enhance security, while a comprehensive dashboard allows users to access vital data and improve productivity. Additionally, our platform includes monitoring and alert systems, as well as customizable, one-click workflow duplication. It serves as the perfect solution for consulting firms, technology partners, and direct clients alike. With our platform, you can implement new integrations swiftly and cost-effectively, ensuring a lower total cost of ownership and enabling online scheduling of integration tasks. You can execute any integration on demand, making Connect Every Ware! the essential tool for modern businesses looking to optimize their operations.
  • 13
    Microsoft Power Platform Reviews
    Collaborate effectively to tackle challenges with the Microsoft Power Platform, which allows you to analyze data, develop solutions, automate workflows, and create virtual agents. Stay updated on the latest announcements from Microsoft Ignite regarding the Power Platform and understand how these innovations facilitate the quicker and more cost-efficient development of applications. Learn how IT professionals are providing low-code tools that meet customer expectations while ensuring straightforward administration and strong security measures. The Microsoft Power Platform comprises various components that work synergistically; when integrated with Office 365, Dynamics 365, Azure, and numerous other applications, they enable the creation of comprehensive business solutions. Empower your team to make well-informed and confident decisions by ensuring that data-driven insights are accessible to everyone. By enabling individuals to construct custom applications that address specific business problems, organizations can transform concepts into actionable solutions. Additionally, enhance overall productivity by equipping everyone with the tools necessary to streamline and automate processes within the organization, ultimately leading to greater efficiency and effectiveness in achieving business objectives.
  • 14
    Proofpoint Identity Threat Defense Reviews
    In a constantly evolving hybrid landscape, the success of your organization hinges on its workforce, their digital personas, and the devices they use to safeguard and enhance its resources. Malicious actors have devised clever methods to traverse your cloud ecosystems by taking advantage of these identities. To tackle this challenge, you require a cutting-edge, agentless solution for detecting and responding to identity threats, enabling you to identify and neutralize contemporary identity vulnerabilities that are crucial in today’s threat landscape. Proofpoint Identity Threat Defense, formerly known as Illusive, provides you with extensive prevention capabilities and visibility over all your identities, allowing you to address identity vulnerabilities before they escalate into significant threats. Additionally, it empowers you to identify lateral movements within your environments and implement deceptive strategies to thwart threat actors before they can access your organization's valuable assets. Ultimately, the ability to mitigate modern identity risks and confront real-time identity threats seamlessly in one platform is an invaluable advantage for any organization aiming to enhance its security posture.
  • 15
    Gurucul Reviews
    Our security controls, driven by data science, facilitate the automation of advanced threat detection, remediation, and response. Gurucul’s Unified Security and Risk Analytics platform addresses the crucial question: Is anomalous behavior truly a risk? This unique capability sets us apart in the industry. We prioritize your time by avoiding alerts related to non-risky anomalous activities. By leveraging context, we can accurately assess whether certain behaviors pose a risk, as understanding the context is essential. Merely reporting what is occurring lacks value; instead, we emphasize notifying you when a genuine threat arises, which exemplifies the Gurucul advantage. This actionable information empowers your decision-making. Our platform effectively harnesses your data, positioning us as the only security analytics provider capable of seamlessly integrating all your data from the outset. Our enterprise risk engine can absorb data from various sources, including SIEMs, CRMs, electronic medical records, identity and access management systems, and endpoints, ensuring comprehensive threat analysis. We’re committed to maximizing the potential of your data to enhance security.
  • 16
    Agile IT Reviews
    Transition to Office 365, Azure, or Dynamics 365 with the assurance of a distinguished Microsoft Gold Partner that has successfully migrated over 2 million accounts. Safeguard your organization and sensitive data using Microsoft 365, which includes the Enterprise Mobility + Security suite. Enable your team to fully leverage the capabilities of Microsoft Teams and SharePoint Online. Revolutionize your approach to endpoint support with Windows 10 managed through Microsoft 365. Collaborate with Microsoft specialists to ensure adherence to state, local, federal, and international compliance, security, and privacy standards. Move past merely using Microsoft 365 as a substitute for email and file storage. Streamline essential business operations with the integration of Teams, SharePoint, Power Platform, and Azure PaaS. Implement technological advancements that enhance your customers' experiences while providing proactive support and empowering end users. With these tools in place, everything operates seamlessly! Additionally, your organization will benefit from continuous innovation and improvement in workflows.
  • 17
    Fidentity Reviews
    A comprehensive solution designed to protect your staff, workplace, and guests is now available. The facial recognition feature offers organizations a reliable method to confirm the identities of individuals entering the premises during check-in. Additionally, it enables visitors to check into a Visitor Management System (VMS) without needing to touch a kiosk, enhancing convenience and safety. The integration of thermal temperature screening allows businesses to monitor the temperatures of both employees and visitors upon entry, adding an important security measure. With touchless check-in, individuals can safely and securely complete their check-in process without the risk of exposure to infectious diseases. Furthermore, mobile check-in empowers users to utilize their own devices to perform a touchless check-in by simply scanning a QR code. This innovative approach not only streamlines the process but also reinforces security, as it allows companies to quickly notify employees of emergencies and provide them with an effective exit strategy to reach a safe location. By implementing these technologies, organizations can create a safer environment for everyone involved.
  • 18
    evenTwo Reviews

    evenTwo

    evenTwo

    €500
    With intuitive tools and a personalized service, you will have the best experience at virtual, hybrid, and face-to-face events. We create the native mobile app for your event that is completely customized and offers the best experience for attendees. You can manage your events with custom forms and mailings. Our QR code check-in app allows you to monitor attendance. Your online event in a customized WebApp. Secure and interactive platform that allows for 1:1 video conferencing, virtual meetings, and many other features. Our apps can adapt to any corporate event. You can customize the design and choose the features that you need to give your audience the experience it deserves. We don't fear failure: success is a certainty! Our customers receive the best service. We understand how difficult this sector can be. Therefore, we will work with you as if it were our own event. A consultant will help you create the perfect app.
  • 19
    AD Lab Reviews
    Utilize AD Lab's divide and conquer approach for efficient data management. This effective solution empowers users to navigate through extensive data sets, accommodate diverse data types, and execute multiple cases simultaneously, all while fostering collaboration in a scalable setting. With its distinct feature of distributed processing, AD Lab allows investigators to harness additional hardware, significantly boosting the speed of case processing and resolution. A one-person lab can greatly enhance its efficiency by leveraging the four-worker distributed processing engines (DPEs) offered by FTK®, while larger labs managing substantial data sets or those collaborating with attorneys, HR, or other stakeholders can elevate their operations by adopting AD Lab. Serving as a centralized investigative platform, AD Lab enhances the experience with robust web-based review features and expanded DPE capabilities, accommodating up to 16 engines with the recent 6.2 release, all supported by a centralized processing farm and database infrastructure. This comprehensive solution positions teams to tackle complex investigations with unparalleled speed and effectiveness.
  • 20
    Change Auditor Reviews
    Managing change reporting and access logs for Active Directory (AD) and enterprise applications can be a challenging and lengthy process, often rendering native IT auditing tools inadequate or even unusable. This difficulty frequently leads to potential data breaches and insider threats that may remain unnoticed without proper safeguards. Luckily, Change Auditor provides a solution to these issues. With Change Auditor, organizations benefit from comprehensive, real-time IT auditing, detailed forensic analysis, and vigilant security threat monitoring covering all essential configuration changes, user interactions, and administrator activities across platforms such as Microsoft Active Directory, Azure AD, Exchange, Office 365, and file servers. Additionally, Change Auditor meticulously records user actions related to logins, authentication, and other critical services, thereby improving threat detection and overall security oversight. Furthermore, its centralized console simplifies the auditing process by eliminating the need for multiple disparate IT audit tools, streamlining operations, and enhancing efficiency.
  • 21
    KeyTalk Reviews
    KeyTalk operates independently from Certificate Authorities while being connected to numerous public CAs, including GMO GlobalSign and Digicert QuoVadis. Transitioning between different CAs is straightforward and efficient, even when managing thousands of certificates and endpoints, eliminating concerns about vendor lock-in. Additionally, KeyTalk features an integrated CA for generating private certificates and keys. Have you found yourself using costly public certificates for internal applications or experiencing the limitations of Microsoft CS and other private CAs? If so, you'll appreciate the benefits of our internal CA and private PKI certificate issuance. KeyTalk automates the management of your certificates throughout their lifecycle, ensuring that you have a comprehensive and current view of all your certificates, which includes details such as certificate names, SAN, and validity periods. Furthermore, it can provide information about the cryptographic keys and algorithms utilized for both internal and external certificates, enhancing your overall security management. With these capabilities, KeyTalk streamlines your entire certificate management process.
  • 22
    RapidScale Identity as a Service Reviews
    RapidScale’s Identity as a Service (IDaaS) offers an ideal solution for organizations striving to simplify network access for their employees while maintaining robust security measures. Leveraging the capabilities of Azure Active Directory, our IDaaS platform delivers strong security features straight out of the box. Safeguard your essential data and applications, whether they reside in the cloud, are hosted, or are deployed on-premises. We provide a variety of features, including single sign-on (SSO), multi-factor authentication (MFA), and password synchronization, among others. Enhancing your login security becomes straightforward with our diverse identity service options. You can take advantage of advanced password synchronization capabilities such as user password reset and writeback, along with many additional services that enable you to manage access more precisely. Our comprehensive service portal makes it simple to oversee your IDaaS offerings alongside your other RapidScale solutions. Alternatively, if you prefer, we can handle the implementation of your IDaaS solution, ensuring a seamless experience for your organization. This flexibility allows you to focus on your core business objectives while we take care of your identity management needs.
  • 23
    OpenText NetIQ Identity Governance Reviews
    Manage the access to applications and data throughout your varied enterprise infrastructure. Regardless of whether you opt for an on-premises setup or a SaaS solution, you will receive comprehensive features that align with what you would anticipate from a contemporary identity governance platform. Identify who has access to essential applications and data, whether located on-site or in the cloud. By utilizing Identity Governance, you can aggregate and visualize identities and entitlements across your entire ecosystem, gaining insights into who has access to what, the individuals who authorized that access, and the rationale behind such approvals. This approach ensures teams remain efficient by granting precise and prompt access to applications and data throughout your multifaceted IT environment. Furthermore, Identity Governance alleviates the burden on your IT personnel and application managers, eliminating the need for them to oversee entitlements in every individual application and platform. You will benefit from an intuitive, self-service system for access requests and approvals, supported by automated fulfillment processes for the most frequently utilized applications, ultimately streamlining operations across your organization. Additionally, this solution enhances accountability and security by providing clear documentation of access rights and the approval process.
  • 24
    ImageWare Authenticate Reviews
    Enhance user access management through the implementation of biometrics. Designed for ease of use and straightforward deployment, Authenticate ensures reliable user verification throughout your enterprise applications and customer interactions. Seamlessly integrate your current environments and utilize its self-enrollment feature to expedite user onboarding. For effortless password-free access, users can select their preferred method from the available options. In scenarios requiring heightened security, the system allows for the enforcement of multi-modal authentication, combining two or more methods for increased protection. Facial Authentication: users simply gaze into a camera on their mobile device or laptop, akin to taking a selfie, achieving the highest security level, particularly when paired with NIST-compliant Biointellic Anti-Spoofing technology. Voice Recognition: users articulate a randomized phrase, typically via their mobile device, adding another layer of security to the authentication process. By leveraging these advanced biometric solutions, organizations can significantly bolster their security frameworks while maintaining user convenience.
  • 25
    AuthControl Sentry Reviews
    Available in more than 54 countries and utilized by various sectors such as finance, government, healthcare, education, and manufacturing, AuthControl Sentry® offers organizations a robust multi-factor authentication (MFA) solution. This innovative tool effectively safeguards applications and data from unauthorized access. AuthControl Sentry® is designed to accommodate diverse architectural needs while promoting widespread user adoption through its wide array of authentication methods. Featuring patented PINsafe® technology, it guarantees top-tier security. The solution is adaptable to both on-premise and cloud environments, allowing for flexible architecture options. Its single tenancy and single-tiered cloud design facilitate enhanced customization opportunities. With built-in risk-based authentication and single sign-on capabilities, it meets the demands of modern security. Furthermore, AuthControl Sentry® integrates effortlessly with hundreds of applications, ensuring maximum adoption and user-friendliness. Ultimately, this comprehensive approach to security positions organizations to effectively manage their authentication needs.
MongoDB Logo MongoDB