Best IT Management Software for Google Authenticator

Find and compare the best IT Management software for Google Authenticator in 2025

Use the comparison tool below to compare the top IT Management software for Google Authenticator on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    OpenVPN Reviews

    OpenVPN

    OpenVPN

    Free Up to 3 Users - $11/month
    198,256 Ratings
    See Software
    Learn More
    Over 15,000 businesses worldwide trust Access Server from OpenVPN for a self-hosted VPN to securely extend their private network to their remote workforce over the internet. That means your remote and hybrid workforce will have access to their business resources with top network security, without adding hundreds of hours of setup and maintenance time to your to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.
  • 2
    Thinfinity Workspace Reviews
    Top Pick

    Thinfinity Workspace

    Cybele Software, Inc.

    14 Ratings
    See Software
    Learn More
    Thinfinity Workspace 7.0's Technical Highlights: - Progressive Web App (PWA) technology for a seamless user experience - Integrated Thinfinity VNC, VirtualUI, and z/Scope for maximum versatility - HTML5 terminal emulation supporting DEC terminals, TN 5220, and TN 3270 protocols - Robust enterprise-grade audit logs for security and compliance management - Proprietary VNC protocol for real-time monitoring and troubleshooting IMPROVE USER EXPERIENCE - Deliver business-critical apps, desktops and files from a single web portal. - Provide simplified remote browser access for your users, while confining them to only the resources that they need. SIMPLIFY IT AND AVOID VPNs - Forget traditional VPN deployments and complexities. - Enable access from Chromebooks, mobile devices or any computer with a Web Browser. Zero setup. KEEP YOUR BUSINESS SECURE - Use enterprise-grade encrypted connections. - Integrate with your existing and external identity platforms. - Apply 2FA or MFA policies with all identity providers.
  • 3
    Kasm Workspaces Reviews
    Top Pick

    Kasm Workspaces

    Kasm Technologies

    $0 Free Community Edition
    123 Ratings
    See Software
    Learn More
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 4
    ManageEngine ADSelfService Plus Reviews

    ManageEngine ADSelfService Plus

    ManageEngine

    $595 for 500 domain users/year
    108 Ratings
    Both IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place.
  • 5
    Keeper Security Reviews
    Top Pick

    Keeper Security

    $2.00 per user, per month
    1,623 Ratings
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 6
    Miro Reviews
    Top Pick
    Miro helps you keep your team's minds in sync. Miro is a virtual whiteboard and remote collaboration tool that helps cross-functional teams collaborate more effectively to create great things. Miro isn't a video conferencing tool, and Miro doesn't try to be. Miro's goal is to provide a platform for teams who work most effectively across areas, geographies, timezones to get more out of their ideas when they can't all be in the office together at the same time. It includes over 200 pre-made templates to capture and visualize ideas, collaboration tools like comments, chat screen sharing and video chat and integrations with popular business tools. Miro AI is your team's ultimate boost, empowering you to unleash your creativity and productivity like never before. We are your launchpad to the future, providing the assistance you need to bring your next big idea to life. Let Miro AI help you unlock the full potential of your team's innovation and collaboration capabilities.
  • 7
    GLPI  Reviews

    GLPI

    TECLIB

    €19/month/user
    1 Rating
    GLPI is a powerful Service Management software that uses open-source technologies. It makes it easy to plan and manage IT changes, solve problems efficiently, automate business processes, and maintain control over your IT infrastructure. Key features of the GLPI: 1. 1. 2. 2. Asset management and automatic inventories 3. Data quality control using rationality 4. Asset management: Administrative and financial 5. Software inventory and management of licences 6. Knowledge and frequently asked questions 7. Statistics and reports 8. 8. 9. Inventory of Android-based devices
  • 8
    Thinfinity Remote Desktop  Reviews
    Thinfinity Remote Desktop allows you to securely deliver your Windows applications and desktops to any device with an HTML5 browser, no matter if they are hosted on the cloud, installed on-premises, or on hybrid architectures. Build a flexible infrastructure mixing browser access to VDI, VMs, RemoteApps, and Unix machines. The virtualization capabilities of Thinfinity Remote Desktop let you create virtual environments in just a few simple steps. It works seamlessly with Hypervisors Like Microsoft Hyper-V, VM-Ware, or VirtualBox. Runs natively on public clouds like AWS or Azure. Authenticate users with Windows or Azure AD and enforce policies by groups, users, or devices. Use Oauth2 to set a Single-Sign-On (SSO) scheme with the most popular identity platforms in the market, or use protocols like SAML or RADIUS to create a 2FA experience.
  • 9
    miniOrange Reviews

    miniOrange

    miniOrange

    $1 per user per month
    1 Rating
    miniOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange.
  • 10
    Getscreen.me Reviews
    The cloud software Getscreen.me allows you to connect to your desktop from anywhere via a direct link through your browser. The quick support function allows you to quickly connect to the user's computer in order to help him solve a problem. You can set up permanent access if you need to connect often. This saves time and allows you to call customers or ask questions in the chat window. If you have a large company, you can create teams and work together under the same account. Getscreen.me is completely safe. The service uses the HTTPS protocol which includes AES encryption. We use algorithms to detect and block attempts to match passwords and one-time links. Integration with popular platforms like Google Chrome Extension, Telegram and Jira Service Desk, as well as with HTTP API.
  • 11
    The Hub  Reviews

    The Hub

    Pancentric Digital

    ÂŁ6.67 per user per month
    Rethink your intranet with HUB and discover a smarter, greener way of working. HUB revolutionizes your organization by uniting resources, streamlining communication, and empowering your team to achieve more. Say goodbye to clunky directories, disorganized workflows, and overloaded inboxes—HUB is your secure, intuitive, all-in-one digital workplace designed for success. HUB simplifies processes, making project management, content sharing, and collaboration effortless. It ensures targeted communications reach the right people at the right time while delivering personalized employee experiences with custom content and branding tailored to different teams. Consolidate all your tools and resources into one seamless platform that’s easy to use, manage, and scale. Designed with SMEs in mind, HUB offers every feature you need in a single, affordable package with no hidden costs—just exceptional value. But HUB goes further, as the first eco-conscious intranet, powered by low-carbon servers and supporting reforestation projects, so you can work smarter while championing sustainability. HUB isn’t just an intranet; it’s a transformation. Whatever your goals, HUB is here to make a lasting difference.
  • 12
    Bastillion Reviews

    Bastillion

    Bastillion

    $0.015 per hour
    Bastillion serves as a web-based SSH console that consolidates the management of administrative access to various systems. This innovative platform combines web administration with the oversight and distribution of users' public SSH keys, utilizing profiles assigned to specific users for organization. Administrators are able to log in securely using two-factor authentication methods such as Authy or Google Authenticator. Once logged in, they can efficiently manage their public SSH keys or establish connections to their systems via a web shell interface. Furthermore, the system allows for the sharing of commands across different shells, which simplifies the patching process and reduces the need for executing redundant commands. Bastillion enhances security by layering TLS/SSL over SSH and functioning as a bastion host for administration purposes. The stacking of protocols (TLS/SSL + SSH) ensures that the infrastructure remains secure and is not vulnerable to exposure through tunneling or port forwarding. In addition, SSH key management is automatically activated to prevent the presence of unmanaged public keys and to uphold best security practices. Bastillion can be used freely under the Prosperity Public License, making it an accessible tool for organizations seeking to streamline their administrative processes. This combination of features positions Bastillion as a robust solution for secure system management in today’s digital landscape.
  • 13
    Avatier Identity Anywhere Reviews

    Avatier Identity Anywhere

    Avatier

    $5.00/one-time/user
    Introducing Identity Anywhere, the pioneering Identity Management solution leveraging Docker containers, which positions it as the most portable, scalable, and secure option available today. With the power of Docker technology, Identity Anywhere can operate seamlessly across any cloud environment, on-premises infrastructure, or within a private cloud setup managed by Avatier. The Avatier Identity Management suite consolidates diverse back-office applications and resources, allowing for centralized management as a cohesive system. Equipped with an intuitive digital dashboard, C-level executives can now drive measurable business growth and enhance profitability. Additionally, this solution addresses the top Help Desk concern by offering a robust self-service password reset feature, akin to military-grade security. It helps in cutting down expenses by ensuring you only pay for the necessary cloud app licenses, while also optimizing company usage through an exceptional shopping cart experience. By implementing this system, organizations can steer clear of fines, lawsuits, negative media attention, and potential legal repercussions associated with non-compliance, thereby ensuring a more secure and efficient operational environment. Furthermore, the streamlined approach to identity management not only improves productivity but also fosters a more agile business model adaptable to future challenges.
  • 14
    IT Portal Reviews

    IT Portal

    IT Portal

    $25 per user per month
    Introducing the ultimate versatile solution for managing Knowledge Bases, Documents, Passwords, and Configurations, whether hosted on our cloud or yours! Clients enjoy seamless access to their documentation both online and offline. This platform is not only favored by Managed Service Providers (MSPs) but also relied upon by IT departments globally. Currently, over 2,500 paying users actively utilize the IT Portal, excluding numerous instances that permit unlimited users. Our cloud services span various regions, including the United States, Canada, the United Kingdom, the European Union, and Australia, while also providing the option to deploy in your own private cloud. As IT teams expand, they often find themselves overwhelmed by disorganized file shares and cumbersome Excel password lists. This solution offers a secure and structured environment that facilitates efficient information access and sharing related to IT infrastructure. The IT Portal effectively minimizes downtime, enhances accountability in documentation, and assures managers and IT professionals of a reliable system. With its robust features, the IT Portal is built to accommodate the evolving needs of growing IT teams, ensuring they stay ahead in an increasingly complex landscape.
  • 15
    cloudtamer.io Reviews
    Manage your cloud environment effectively with leading software designed for automated cloud governance. Set cloud regulations, such as prohibiting the creation of public objects, only once, and they will automatically apply to all new accounts created subsequently. Additionally, you can view all your policies conveniently displayed on your organizational chart. Enjoy comprehensive cloud boundaries and enable self-service account provision while having access to a detailed overview of your organization. Receive alerts or halt spending as you approach your limits, potentially reducing your total cloud expenditure by 30%. Create financial plans that align seamlessly with your actual requirements across all cloud service providers. Leverage our compliance checks to ensure alignment with widely recognized standards like NIST and CIS, or design custom standards tailored to your specific needs. You can then address any compliance issues either automatically or manually through the dashboard. Get started today with provisioning auto-governed accounts, conducting compliance checks, and gaining financial oversight in the cloud. We’re so confident in our solution that if you’re not satisfied, we’ll eat our hat. By automating the provisioning process for cloud accounts, we significantly minimize your setup time, enabling a smoother transition to efficient cloud management.
  • 16
    Delinea Cloud Access Controller Reviews
    Achieve precise governance over web applications and cloud management systems with Delinea's Cloud Access Controller, a robust PAM solution designed to function at cloud speed, ensuring rapid deployment and secure access to any web-based application. This innovative tool allows seamless integration of your current authentication systems with various web applications without necessitating any additional coding efforts. You can implement detailed RBAC policies that uphold least privilege and zero trust principles, even for custom and outdated web applications. Define the specific data an employee is permitted to view or alter within any given web application, and effectively manage access permissions with the ability to grant, modify, and revoke access to cloud applications. Control who has access to specific resources at a detailed level and monitor the usage of all cloud applications meticulously. Additionally, the platform features clientless session recording without the need for agents, ensuring secure access to a wide array of web applications, encompassing social media, custom solutions, and legacy systems alike. This comprehensive approach not only enhances security but also streamlines access management for diverse organizational needs.
  • 17
    Deepnet DualShield Reviews
    If you're in search of a robust enterprise-level solution for two-factor authentication (2FA) or multi-factor authentication (MFA) that can effectively protect a variety of popular business applications while offering numerous authentication options, you've come to the right spot. Deepnet DualShield stands out as a comprehensive multi-factor authentication platform that integrates multiple authentication techniques, protocols, and user experiences seamlessly. Beyond its core MFA capabilities, DualShield also features self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM), and Adaptive Authentication functionalities. This system is recognized as one of the most effective and adaptable multi-factor authentication solutions available globally. Furthermore, Deepnet DualShield can be deployed either on-site or within a private cloud environment, granting you complete oversight of your user authentication processes and ensuring that your users' identities and credentials remain secure. With its versatility, DualShield not only enhances security but also streamlines user access across your organization.
  • 18
    SecureMFA Reviews

    SecureMFA

    SecureMFA

    $178.25 per year
    The OTP authentication module for Microsoft ADFS, compatible with both ADFS 2019 and ADFS 2016 servers, facilitates multi-factor authentication (MFA) through a Time-Based One-Time Password (TOTP) mechanism, adhering to RFC6238 standards. This MFA solution mandates that users input a one-time passcode generated by authenticator applications like Microsoft Authenticator, Google Authenticator, or Symantec VIP to finalize their second factor authentication during the login process. Additionally, it allows for self-registration via QR codes using free mobile apps, while securely storing OTP data in Microsoft Active Directory attributes or MS SQL Server. Encryption of QR secrets is implemented using AES 256-bit technology, enhancing security further. The configuration also includes specifying network locations (both IPv4 and IPv6) from which users can scan the QR code, and it supports trust relationships across multiple ADDS forests, making it a highly versatile security solution. With these features, organizations can effectively bolster their security protocols and ensure a robust authentication process.
  • 19
    Gated Reviews
    Gated offers a straightforward and cost-free method to minimize unwanted emails while simultaneously supporting a charitable organization you care about. If your inbox is overflowing with irrelevant messages, Gated provides a free solution that filters out the noise by requiring unfamiliar senders to contribute to a cause you support in order to get in touch with you. This innovative service operates quietly in the background, effectively managing unwanted correspondence. By utilizing Gated, you can assist your chosen nonprofit as unfamiliar senders make donations to connect with you. Setting up a Gated account takes just a few minutes, and it requires no additional learning of new tools. The automated filter conveniently integrates into your existing email habits and adapts based on your engagement with emails, ensuring that trusted contacts can still reach you as they always have. When an unfamiliar sender wants to contact you, they must first donate to your favorite charity, and Gated will automatically challenge them with an email. It continuously learns from your interactions to prioritize known senders and fits effortlessly into your daily workflow. Moreover, Gated employs Google Secure Authorization, which you can choose to revoke whenever you need, ensuring your control over your email security. By using Gated, you're not just decluttering your inbox; you're also making a positive impact on causes that matter to you.
  • 20
    Kion Reviews
    Kion provides a comprehensive single-platform solution for setup and provisioning, financial oversight, and compliance across major cloud services including AWS, Azure, and Google Cloud. This unique approach elevates cloud management and governance by encompassing all essential elements required for complete cloud oversight. By enabling the provisioning of accounts and ensuring enterprise-wide visibility, Kion seamlessly integrates the cloud into your existing technology infrastructure, thereby automating the entire cloud lifecycle. From day one, Kion assists in setting up the cloud correctly by automating account provisioning with appropriate controls on permitted services and expenditures. Furthermore, it facilitates the prevention, detection, reporting, and remediation of issues to ensure adherence to industry regulations and internal policies. Users can efficiently allocate and monitor their spending, access real-time and predictive financial data, pinpoint opportunities for savings, and enforce strict budgetary constraints. Kion goes beyond merely providing tools for cloud management and governance, offering a holistic solution that enhances operational efficiency and strategic decision-making.
  • 21
    Securden Unified PAM MSP Reviews
    MSPs must purchase multiple solutions to enforce complete access governance. We have combined all required modules into a single unified solution to solve the most critical challenges faced by managed IT services providers. MSPs are able to generate recurring revenue streams in addition to deploying robust controls for access. Remote access based on JIT can be granted to third parties as well as employees. Track and record all activity for complete control. Reduce the attack surface of external and internal threats. Automate privileged-access provisioning to reduce the load on helpdesks and eliminate downtime. Implement robust privileged-access workflows to instantly increase efficiency.
  • 22
    SecureLink Reviews
    SecureLink is the market leader in vendor privileged access management and remote support for highly regulated enterprises and technology vendors. SecureLink is used by more than 30,000 organizations around the world. SecureLink's purpose-built platform is trusted by top-notch companies in many industries, including legal, gaming, healthcare, financial services and retail. SecureLink is headquartered at Austin, Texas.
  • 23
    CentreStack Reviews
    CentreStack enhances workforce mobility by providing cloud file sharing and mobile access, while ensuring that security permissions and the user experience remain consistent with traditional file servers. By leveraging Active Directory and inheriting permissions, it seamlessly integrates the existing on-premise security of IT infrastructure with the flexibility of cloud mobility, making it an unparalleled solution. This platform not only transforms file servers to support productivity and collaboration for mobile workers using various devices like smartphones and tablets, but it also allows for the option to either upgrade an existing file server for mobile access or migrate data and security permissions to a chosen cloud environment. In both scenarios, CentreStack prioritizes a user-friendly file server experience, bolstered by improved usability, security measures, compliance standards, and data control. Furthermore, enterprises have the choice to uphold their security and compliance by retaining their data within on-premise file servers, without needing to engage in cloud replication, ensuring that they can maintain their established protocols and practices. This flexibility makes CentreStack a strategic asset in adapting to the evolving landscape of mobile workforce demands.
  • 24
    Airlock Reviews
    The Secure Access Hub by Airlock safeguards applications, APIs, and data from identity theft and prevalent web application threats. Blending security with user-friendliness, Airlock ensures a seamless customer experience through features like single sign-on, social registration, extensive user self-service options, and effective consent management. In a market that demands agility, the Airlock Secure Access Hub is designed to deliver crucial security functions, including registration, authentication, and user self-services, allowing businesses to focus their IT resources on core operations. Furthermore, this hub assists in adhering to various international compliance standards, encompassing GDPR, PSD2, PCI-DSS, OWASP, and MAS. By serving as a centralized enforcement point for access policies related to applications and services, it enables compliance with regulations while minimizing the need for modifications in each application. This innovative solution not only enhances security but also streamlines operational efficiency for businesses.
  • 25
    Constant Reviews
    Quickly launch and expand bare metal, virtual servers, and storage solutions worldwide. We are dedicated to empowering developers to create and enhance applications through the most effective global cloud infrastructure available. Focus more on application development and less on infrastructure management. Speed up your development process with adaptable, dependable cloud resources that can be set up in mere seconds. Utilize CI/CD on our infrastructure to build, deploy, and scale your projects effortlessly. Ensure that computing and storage capabilities are provided exactly where they are most required. Expand your platform to guarantee peak performance for users across the globe. Create a worldwide application backend to engage customers seamlessly. Effortlessly handle the demands of resources that are dynamic and rapidly increasing. Constant's leading offering, Vultr, is a popular choice among developers, serving over 1.5 million clients with versatile, scalable, and global bare metal, cloud computing, and storage options. Experience the difference with a platform designed specifically to meet the needs of modern developers.
  • Previous
  • You're on page 1
  • 2
  • Next