Best IT Management Software for Microsoft Entra ID - Page 6

Find and compare the best IT Management software for Microsoft Entra ID in 2026

Use the comparison tool below to compare the top IT Management software for Microsoft Entra ID on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Poppulo Reviews
    Poppulo is a leading software company for workplace experience and communications. Enterprise organizations can connect more people, customers, and places through the Poppulo Harmony platform. It enables them to seamlessly connect their employees, customers, workplaces, and customers via omnichannel employee communications, digital signage and workplace management. Poppulo's 6,000+ customers are representative of some of the most successful companies in the world, including 47 of Fortune 100.
  • 2
    Oracle Identity Management Reviews
    Oracle Identity Management empowers organizations to efficiently oversee the complete lifecycle of user identities across all enterprise resources, extending beyond the firewall and into cloud environments. This comprehensive platform provides scalable solutions for identity governance, access management, and directory services. By implementing this contemporary system, organizations can enhance security, streamline compliance processes, and seize business opportunities related to mobile and social access. As part of the Oracle Fusion Middleware suite, Oracle Identity Management contributes to increased agility, improved decision-making, and lowered costs and risks in various IT landscapes today. Furthermore, we are excited to introduce a groundbreaking, fully integrated service that encompasses all essential identity and access management functions via a multi-tenant Cloud platform, known as Oracle Identity Cloud Service, which further elevates the user experience and operational efficiency.
  • 3
    Exigence Reviews
    Exigence provides a command-and-control center software that helps manage major incidents. Exigence automates collaboration between stakeholders within and outside the organization. It organizes it around a timeline that records each step taken to resolve an issue and drives workflows among stakeholders and tools. This ensures that all stakeholders are on the same page. The product connects stakeholders, processes, and tools, reducing time to resolution. Customers who have used Exigence have experienced a transparent process, quicker onboarding of the relevant stakeholders, and a shorter time to resolve critical incidents. Exigence is used by customers to address critical incidents as well as for planned cyber incidents such as business continuity testing or software release.
  • 4
    Workspace ONE Reviews
    Efficiently and securely manage and deliver any application across various devices using Workspace ONE, an intelligent digital workspace platform. This comprehensive solution combines access control, application management, and multi-platform endpoint management into a unified platform, available as both a cloud-based service and an on-premises option. It enhances employee engagement and productivity by providing a tailored experience, allowing immediate access to any application on any device from the very first day. Adopt a single, cloud-driven solution for unified endpoint management that caters to every device and use case, promoting a seamless operational flow. By eliminating silos, organizations can streamline the management of all device and application types, resulting in faster processes with fewer individual solutions while expanding capabilities. Additionally, ensure the security of devices, users, and data through conditional access, automated patch management, and configuration policies, all aimed at establishing a robust Zero Trust security framework. This holistic approach not only fortifies security but also enhances organizational efficiency.
  • 5
    Commvault Cloud Reviews
    Commvault Cloud serves as an all-encompassing cyber resilience solution aimed at safeguarding, managing, and restoring data across various IT settings, which include on-premises systems, cloud infrastructures, and SaaS platforms. Utilizing the power of Metallic AI, it boasts cutting-edge functionalities such as AI-enhanced threat detection, automated compliance mechanisms, and accelerated recovery options like Cleanroom Recovery and Cloudburst Recovery. The platform guarantees ongoing data protection through proactive risk assessments, threat identification, and cyber deception tactics, all while enabling smooth recovery and business continuity through infrastructure-as-code automation. By providing a streamlined management interface, Commvault Cloud allows organizations to protect their vital data assets, ensure regulatory compliance, and quickly address cyber threats, which ultimately helps in reducing downtime and minimizing operational interruptions. Additionally, the platform's robust features make it an essential tool for businesses aiming to enhance their overall data security posture in an ever-evolving digital landscape.
  • 6
    Akamai Reviews

    Akamai

    Akamai Technologies

    Akamai brings digital experiences closer to users than any other provider while simultaneously keeping threats and attacks at bay. As it drives the next wave of digital transformation, the Akamai Intelligent Edge Platform acts as a comprehensive shield, safeguarding all aspects of the digital ecosystem, including websites, users, devices, data centers, and clouds. This technology effectively reduces friction and enhances user engagement. With a network of a quarter of a million edge servers strategically positioned in numerous locations worldwide, it processes an astounding 2.5 exabytes of data annually, engaging with 1.3 billion devices and 100 million IP addresses daily. Positioned within a single network hop of over 90% of the global Internet population, it stands out as the sole global, extensively distributed, intelligent edge platform, delivering the scale, resilience, and security that modern businesses require. Additionally, it offers advanced threat intelligence to help organizations manage security vulnerabilities and defend against cyber threats. This comprehensive approach ensures that digital operations remain secure and efficient in an increasingly complex online landscape.
  • 7
    Visual KPI Reviews
    Monitoring and visualization of real-time operations, including KPIs and dashboards. Also includes trends, analytics, hierarchy, alerts, and analytics. All data sources (industrial and IoT, business, and external) are gathered. It displays data in real-time on any device, without the need to move it.
  • 8
    Traka Web Reviews
    Traka Web serves as a sophisticated software platform, functioning as a flexible, web-based management suite that is compatible with any device permitted on your network. This user-friendly, browser-accessible administration software equips organizations with the essential tools required to oversee all Traka key cabinets and lockers from a central location. By enabling regionalized administrative control, specific departments within an organization can tailor their security protocols to enhance the management of keys and assets, thereby increasing operational efficiency. Furthermore, Traka Web's capability to integrate seamlessly with existing third-party systems helps to significantly lower administrative burdens while optimizing essential processes that are vital for daily operations. Ultimately, this innovative solution streamlines the management of resources, making it an invaluable asset for any organization looking to improve its security and efficiency.
  • 9
    ManageEngine Identity Manager Plus Reviews
    A secure, single sign-on (SSO) solution for enterprises. ManageEngine's Identity Manager Plus, the IT division at Zoho, allows end users to access the applications they need in one click. IT administrators can also manage and monitor application access using a single console. Users can gain secure, one-click access for enterprise applications. To access all their applications, users only need to log in once. Allow SSO to hundreds popular applications from our app catalog, or any SAML-based internal app using custom integrations. Track who accessed which application, when, and from what source. Find out which applications are most used, inactive users, etc. You can import users directly from G Suite or Azure AD. Or you can use the Zoho Directory built-in to onboard contractors and temporary employees. You can configure SSO for applications, add users and enable application access to users. You can also track application access from one central console.
  • 10
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 11
    Agile IT Reviews
    Transition to Office 365, Azure, or Dynamics 365 with the assurance of a distinguished Microsoft Gold Partner that has successfully migrated over 2 million accounts. Safeguard your organization and sensitive data using Microsoft 365, which includes the Enterprise Mobility + Security suite. Enable your team to fully leverage the capabilities of Microsoft Teams and SharePoint Online. Revolutionize your approach to endpoint support with Windows 10 managed through Microsoft 365. Collaborate with Microsoft specialists to ensure adherence to state, local, federal, and international compliance, security, and privacy standards. Move past merely using Microsoft 365 as a substitute for email and file storage. Streamline essential business operations with the integration of Teams, SharePoint, Power Platform, and Azure PaaS. Implement technological advancements that enhance your customers' experiences while providing proactive support and empowering end users. With these tools in place, everything operates seamlessly! Additionally, your organization will benefit from continuous innovation and improvement in workflows.
  • 12
    KeyTalk Reviews
    KeyTalk operates independently from Certificate Authorities while being connected to numerous public CAs, including GMO GlobalSign and Digicert QuoVadis. Transitioning between different CAs is straightforward and efficient, even when managing thousands of certificates and endpoints, eliminating concerns about vendor lock-in. Additionally, KeyTalk features an integrated CA for generating private certificates and keys. Have you found yourself using costly public certificates for internal applications or experiencing the limitations of Microsoft CS and other private CAs? If so, you'll appreciate the benefits of our internal CA and private PKI certificate issuance. KeyTalk automates the management of your certificates throughout their lifecycle, ensuring that you have a comprehensive and current view of all your certificates, which includes details such as certificate names, SAN, and validity periods. Furthermore, it can provide information about the cryptographic keys and algorithms utilized for both internal and external certificates, enhancing your overall security management. With these capabilities, KeyTalk streamlines your entire certificate management process.
  • 13
    RapidScale Identity as a Service Reviews
    RapidScale’s Identity as a Service (IDaaS) offers an ideal solution for organizations striving to simplify network access for their employees while maintaining robust security measures. Leveraging the capabilities of Azure Active Directory, our IDaaS platform delivers strong security features straight out of the box. Safeguard your essential data and applications, whether they reside in the cloud, are hosted, or are deployed on-premises. We provide a variety of features, including single sign-on (SSO), multi-factor authentication (MFA), and password synchronization, among others. Enhancing your login security becomes straightforward with our diverse identity service options. You can take advantage of advanced password synchronization capabilities such as user password reset and writeback, along with many additional services that enable you to manage access more precisely. Our comprehensive service portal makes it simple to oversee your IDaaS offerings alongside your other RapidScale solutions. Alternatively, if you prefer, we can handle the implementation of your IDaaS solution, ensuring a seamless experience for your organization. This flexibility allows you to focus on your core business objectives while we take care of your identity management needs.
  • 14
    OpenText NetIQ Identity Governance Reviews
    Manage the access to applications and data throughout your varied enterprise infrastructure. Regardless of whether you opt for an on-premises setup or a SaaS solution, you will receive comprehensive features that align with what you would anticipate from a contemporary identity governance platform. Identify who has access to essential applications and data, whether located on-site or in the cloud. By utilizing Identity Governance, you can aggregate and visualize identities and entitlements across your entire ecosystem, gaining insights into who has access to what, the individuals who authorized that access, and the rationale behind such approvals. This approach ensures teams remain efficient by granting precise and prompt access to applications and data throughout your multifaceted IT environment. Furthermore, Identity Governance alleviates the burden on your IT personnel and application managers, eliminating the need for them to oversee entitlements in every individual application and platform. You will benefit from an intuitive, self-service system for access requests and approvals, supported by automated fulfillment processes for the most frequently utilized applications, ultimately streamlining operations across your organization. Additionally, this solution enhances accountability and security by providing clear documentation of access rights and the approval process.
  • 15
    Ozone Reviews
    Ozone platform allows enterprises to quickly and securely ship modern applications. Ozone eliminates the need to manage too many DevOps tools, making it easy to deploy applications on Kubernetes. Integrate all your existing DevOps tools to automate your application delivery process. Automated pipeline workflows make deployments faster and allow for on-demand infrastructure management. Enforce compliance policies and governance for app deployments at scale to prevent business losses. One pane of glass, where engineering, DevOps, and security teams can collaborate on app releases in realtime.
  • 16
    Panaseer Reviews
    Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts.
  • 17
    Valo Reviews
    Valo provides exceptional intranet solutions and tools that go beyond mere communication and collaboration, ultimately improving employee engagement and supporting organizational growth, regardless of your team's location. As the largest and fastest-expanding company in the internal communications technology sector globally, we invite you to explore the implications of this development for our organization, our clients, and those aspiring to elevate their internal communications. Our offerings include intranet solutions designed to unite teams and governance tools that promote organized collaboration, all perfectly integrated within the Microsoft ecosystem. Create your ideal workplace by consolidating intranet site content, Microsoft applications, and external resources directly within Microsoft Teams. You can effectively manage your groups and teams while establishing necessary structure and automated governance through Valo Teamwork. Embrace the potential of Microsoft Teams to foster innovation! Every significant initiative begins with a simple idea, and with Valo, that concept can evolve into a comprehensive business strategy. This is the future of workplace collaboration and employee engagement.
  • 18
    Control Plane Reviews
    Control Plane is a multicloud-native, modern app platform (PaaS), built on Kubernetes. It enables you build, deploy, manage, and run microservices faster and easier with ultra high availability. Control Plane is different from other app platforms. Multicloud and multi-region: Your workloads can run in any combination of the computing power and geographical regions of AWS and GCP, Azure, and Private Clouds. Your app can be run in any region of the cloud you choose, and as long as one cloud is active, your endpoint is also available. Flexible: Microservices can access ANY service on ANY cloud (BigQuery, AD on Azure, and SQS on AWS) as if they were native without needing credentials. Fast: The cloud-native ops stack is fast for secrets management, metrics and logging, software defined VPN, geo-intelligentDN and other functions. It's integrated, preconfigured and easy to use. Efficient: Cloud consumption elastically optimized for the exact resources needed.
  • 19
    Lumos Reviews
    Lumos serves as a company's internal AppStore, streamlining access requests, reviews, and license management through a self-service platform. By automating access requests, approvals, and provisioning, organizations can significantly reduce the number of support tickets they receive. This not only enhances visibility into all SaaS applications and associated spending but also facilitates the removal of unused licenses through automated workflows. As businesses expand their workforce and adapt to remote working conditions, the influx of help desk tickets related to app access and permission requests can become overwhelming. With Lumos, you can manage permissions and approve access durations directly within Slack, ensuring a smoother process. Prior to a new hire's start date, Lumos will alert their manager and assist in setting up all necessary applications for them. It’s important to recognize that not all employees require access to every application; therefore, Lumos allows you to customize the AppStore according to specific employee roles, helping to streamline operations and minimize potential complications. By implementing Lumos, organizations can enhance efficiency and focus on what truly matters—driving success.
  • 20
    Pathlock Reviews
    Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.
  • 21
    Windows Autopilot Reviews
    Windows Autopilot streamlines the deployment, resetting, and repurposing of devices, creating an entirely touchless experience for IT departments. Simply unbox and power on your Windows device, and Windows Autopilot will configure it from the cloud in just a few straightforward steps. Users can monitor their configuration process through Windows Autopilot, resulting in a more personalized setup and overall user experience. By connecting devices deployed via Windows Autopilot to Azure Active Directory (AD) and mobile device management, organizations can simplify the setup for end users without requiring IT assistance. Additionally, Windows Autopilot allows for the seamless deployment of the latest Windows 11 version on existing devices, complete with pre-installed applications and synchronized user profiles, enabling users to get back to work immediately. IT staff and partners can also pre-provision Windows 11 devices to ensure they are fully configured and ready for business use. Furthermore, the system can easily remove personal files, apps, and settings, reverting to the device's original configuration, thus enhancing security and usability for new users. This comprehensive approach not only saves time but also significantly boosts productivity across the organization.
  • 22
    Entitle Reviews
    Entitle integrates a security-centric strategy for provisioning and governance while also prioritizing business facilitation across all departments, including R&D, sales, HR, and finance. Accelerate the provisioning process to enable security policies that adapt automatically to the evolving infrastructure and the varying needs of employees. Assign permissions to designated resources such as Google Drive directories, database tables, Git repositories, and more to maintain control. Protect sensitive resources and roles by allowing access only when necessary and revoking it when it is no longer needed. Empower colleagues, managers, and resource owners to authorize access requests, ensuring that the permissions granted are reliable. With automated access requests and a zero-touch provisioning approach, DevOps, IT, and other teams can significantly enhance efficiency and resource management. Users have the convenience of requesting access through platforms like Slack, Teams, Jira, or email, facilitating a smooth approval experience. Additionally, quickly grant bulk permissions to streamline the onboarding and offboarding processes, effectively adapting to the dynamics of the organization. This comprehensive approach not only safeguards data but also fosters a collaborative environment where teams can thrive.
  • 23
    Scrut Automation Reviews
    Scrut is a comprehensive AI-powered GRC platform designed to help organizations manage risk, security, and compliance in a more intelligent and automated way. It provides real-time insights into an organization’s security posture by monitoring risks across infrastructure, applications, employees, and third-party vendors. The platform automates key processes such as control monitoring, evidence collection, and audit preparation, reducing the burden of manual work. Scrut offers a library of pre-built compliance frameworks, policies, and templates, enabling faster implementation and continuous compliance. Its AI-powered teammates provide guidance for remediation, risk assessments, and compliance tasks, helping teams resolve issues quickly. The platform also supports customizable workflows, allowing businesses to tailor their security programs to their unique needs. With seamless integrations, Scrut connects with existing tools to streamline operations and improve collaboration. It enables organizations to manage multiple compliance frameworks simultaneously without redundancy. The system ensures audit readiness by continuously tracking compliance status and validating evidence. Overall, Scrut empowers organizations to move beyond basic compliance and build a proactive, scalable security program.
  • 24
    Veeam Backup for Microsoft Entra ID Reviews
    Veeam Backup for Microsoft Entra ID is a specialized tool crafted to safeguard and restore data in Microsoft Entra ID settings. This solution empowers organizations to back up essential elements including users, groups, administrative units, roles, applications, and service principals, securely storing them in PostgreSQL databases. Additionally, it offers the ability to back up audit and sign-in logs, which is vital for thorough data protection and ensuring compliance standards are met. Thanks to its granular restoration features, Veeam Backup for Microsoft Entra ID permits the targeted recovery of specific items or their attributes, thereby reducing downtime and supporting uninterrupted business operations. This level of detail ensures that businesses can quickly respond to data loss incidents without significant disruption to their services.
  • 25
    Kelverion Automation Portal Reviews
    Kelverion's Automation Portal functions as a streamlined, user-friendly interface aimed at facilitating IT process automation, allowing both end users and IT professionals to initiate, monitor, and oversee automated operations across multiple platforms. This portal is built around an intuitive, forms-based design that integrates effortlessly with various automation solutions such as Azure Automation, Power Automate, Logic Apps, and System Center Orchestrator, in addition to connecting with external systems through a comprehensive REST API. It is versatile enough to accommodate both on-premise and cloud-based deployments and is capable of operating as an IIS web application. User authentication is managed through Microsoft Entra ID, which guarantees a high level of security for enterprise users. Among its notable features are a real-time dashboard showcasing the savings in time and costs achieved through automation, the status of requests, and the most frequently made requests; it also offers support for high availability via Windows Network Load Balancing (NLB), enabling users to submit and oversee IT requests conveniently from anywhere. Ultimately, the portal enhances operational efficiency by streamlining the automation process and providing valuable insights to its users.
MongoDB Logo MongoDB