Best IT Security Software for Microsoft Dynamics 365

Find and compare the best IT Security software for Microsoft Dynamics 365 in 2025

Use the comparison tool below to compare the top IT Security software for Microsoft Dynamics 365 on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    GoAnywhere MFT Reviews
    Top Pick
    See Software
    Learn More
    GoAnywhere MFT offers secure file transfer for businesses. GoAnywhere MFT software can be deployed on-premise, in cloud or hybrid environments. It allows organizations to securely exchange data between employees, customers, trading partners, and systems. GoAnywhere MFT won the Cybersecurity Excellence Award in Secure File Transfer.
  • 2
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    817 Ratings
    See Software
    Learn More
    Auth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.
  • 3
    10Duke Enterprise Reviews
    Top Pick See Software
    Learn More
    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution designed to enable software vendors to easily configure, manage and monetize the licenses they provide to their customers. 10Duke Enterprise enables you to gain a single point of license control for desktop, SaaS, and mobile apps, APIs, VMs and devices. It’s cloud-native, supports all license models, integrates with CRM & Ecommerce, has a built-in Customer Identity Management solution, and supports offline scenarios. 10Duke Enterprise is used by SMBs and Fortune 500 customers alike. 10Duke Enterprise is used across a wide range of industries by the fastest-growing software vendors that offer desktop, SaaS and mobile apps, devices, APIs and VMs. It's specifically designed for fast-growing software businesses looking to scale up licensing & minimize friction. › Vastly reduce internal license admin costs (up to 70%) › Improve how your customers can trial and access your products › Learn how and when your customers are using your licenses and product features to help drive license sales › Prevent revenue leakage by means of a real-time licensing and access control solution › Integrate with 3rd party systems like CRM & E-Commerce
  • 4
    SolarWinds Server & Application Monitor Reviews
    SolarWinds®, Server & Application Monitor, (SAM), is designed to monitor and manage your applications and supporting infrastructure, no matter if they are running on-premises or in the cloud. Slow applications and downtime shouldn't impact your business services and end users. Find the root cause of any application problems across all layers of the IT stack. Automatedly discover the environment of your application and begin monitoring it, usually in less than an hour. No consultation or professional services required.
  • 5
    Egnyte Reviews

    Egnyte

    Egnyte

    $10 per user per month
    6 Ratings
    Secure and manage all your content across distributed teams, devices and apps. Uncover new business insights, scale compliance and governance, reduce costs, and increase productivity. Right out of the box. Flexible deployment models, robust integration ecosystem, and open APIs to address the business needs of companies in diverse industries and regions, and at different levels of cloud adoption. Egnyte helps thousands of customers take their cloud office strategy into hyper-drive. Transform your approach to content governance, privacy, compliance, and workflow automation with a single, turnkey platform.
  • 6
    Microsoft Authenticator Reviews
    Top Pick
    Go passwordless. Enter your username to confirm your sign-in via your phone. It's easy! Passwords can be lost, stolen, or compromised. Authenticator adds an extra layer to your phone's security beyond your fingerprint or PIN. Authenticator allows you to sign in to Outlook, OneDrive and Office. Two-step verification protects all your accounts. You can also use the industry-standard time-based OTP (onetime password) codes to secure all your online accounts.
  • 7
    AvePoint Reviews
    AvePoint is the only provider of complete data management solutions for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service userbase in the Microsoft 365 ecosystem. AvePoint is trusted by more than 7 million people worldwide to manage and protect their cloud investments. Our SaaS platform offers enterprise-grade support and hyperscale security. We are available in 12 Azure data centers. Our products are available in 4 languages. We offer 24/7 support and have market-leading security credentials like FedRAMP and ISO 27001 in-process. Organizations that leverage Microsoft's comprehensive and integrated product portfolio can get additional value without having to manage multiple vendors. These SaaS products are part of the AOS platform: o Cloud Backup o Cloud Management o Cloud Governance o Cloud Insights o Cloud Records Policies and Insights o MyHub
  • 8
    Sesame Software Reviews
    When you have the expertise of an enterprise partner combined with a scalable, easy-to-use data management suite, you can take back control of your data, access it from anywhere, ensure security and compliance, and unlock its power to grow your business. Why Use Sesame Software? Relational Junction builds, populates, and incrementally refreshes your data automatically. Enhance Data Quality - Convert data from multiple sources into a consistent format – leading to more accurate data, which provides the basis for solid decisions. Gain Insights - Automate the update of information into a central location, you can use your in-house BI tools to build useful reports to avoid costly mistakes. Fixed Price - Avoid high consumption costs with yearly fixed prices and multi-year discounts no matter your data volume.
  • 9
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 10
    Mailock Reviews

    Mailock

    Beyond Encryption

    $9.30 per user per month
    Mailock secure emails allow companies to securely exchange sensitive information with their customers without compromising their data. It combines award winning encryption technology with multifactor authentication to protect confidential email from cyber risk. You can compose a secure email using your desktop or browser, or you can use rules and keywords. Set authentication challenges to confirm your recipients' identities so that only the right people can gain access. Track your recipients' activities with real-time notifications and audit trails. Recipients are able to encrypt their replies without charge. Give your customers a secure connection to your business. Automated secure email delivery allows you to send confidential documents in large volumes to your customers.
  • 11
    Own Data Reviews

    Own Data

    Own Data

    $2.90 per month
    Owning your SaaS-data is easy with the Own Data platform. It allows you to ensure availability, compliance and security of mission critical data, and unlocks new opportunities to transform your business. SaaS applications help make data more secure, accessible, and safer. They have not increased its value for you. It's no secret that your business is more complex than ever, and managing and getting insights out of your data is not easy. You are limited by what your SaaS providers allow you to do with your data. Understanding data exposure risks will help you to strengthen your Salesforce security posture. Protect your data using automated backups, proactive notifications in the event of loss or corruption and easy-to use recovery tools. Seed quality data quickly into any sandbox, sub-prod, or development environment for testing, training, and development purposes. Archive outdated data from production environments in order to avoid overage costs, improve the performance, and ensure compliance.
  • 12
    ISOPlanner Reviews

    ISOPlanner

    ISOPlanner

    €53 per month
    Use your Microsoft 365 Account to leverage Sharepoint, Outlook Teams, Dynamics Azure and Power Bl. Use Microsoft Power Automate or Power Flow to integrate compliance controls into your business processes. Your data will never leave the Microsoft ecosystem. Learn how a software can help you implement a management system that will be accepted by your organization. ISOPlanner embeds all compliance requirements into the Microsoft products that you already use. Microsoft 365 can be extended with lightweight functionality. High-quality features will make you smile. You'll love the simplicity of ISOPlanner, which will help you get your work done. ISOPlanner is integrated into Microsoft 365 so you don't have to learn a new tool. You and your colleagues will be able to collaborate in a central location. This makes the process easy. ISO implementation will not be faster.
  • 13
    Dynamics 365 Fraud Protection Reviews
    Most of the business conducted by today's digitally-transformed enterprise is online and in real time. There is little human involvement. This approach reduces costs and improves customer experience. However, it exposes the enterprise's security to serious fraud threats from sophisticated users that try to take advantage the relative anonymity and accessibility of the online channel. In e-commerce for example, some transactions can be maliciously created by using compromised accounts and stolen payment methods. Other malicious activities may include account takeovers, abuses of free trials, fake reviews, warranty frauds, refund frauds, reseller frauds, abuses of program discounts. All of these activities and others can affect the profitability and reputation of an enterprise. Today, fraudsters can orchestrate fraudulent transactions with the help of well-funded and equipped rings of professionals.
  • 14
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business.
  • 15
    Citrix Enterprise Browser Reviews

    Citrix Enterprise Browser

    Cloud Software Group

    $2 per user per month
    Keep your data secure from browser-based attacks. Internet is one of your biggest enemies when it comes to security. This is a problem because employees need to be able to access the internet in order to be productive. Citrix Enterprise Browser can help. This cloud-hosted web browser allows you to protect your network thoroughly without complicating the user experience. Go ahead--let employees browse away. We'll isolate this traffic and keep your network safe. Your devices and data are protected even if someone visits a compromised website. Teams have more freedom. You get greater control. Employees want unlimited browsing. IT must keep web-based threats at bay. Citrix Enterprise Browser allows you to do both. Citrix Enterprise Browser is completely independent of your network. Each session is destroyed once used, so browsing is completely isolated. Even as you give employees more options to work on the go, your corporate resources are still safe.
  • 16
    Pathlock Reviews
    Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.
  • 17
    VIDchain Reviews
    Digital identity is not new. Since the advent of the internet, it has been difficult to verify the identity of individuals in a digital environment. This is both for users who have lost their privacy and control over their personal information, and for companies who have experienced inefficient and constant security breaches. VIDchain is a decentralized self-rule identification (SSI) service based upon Blockchain. It gives people control over their identities and allows them secure access to online services. It improves processes and lowers identity verification costs. It improves anti-fraud and eIDAS compliance. It is based on standards that eliminate the need to have hundreds of credentials. You can easily verify your digital identity with anyone.
  • 18
    Deep Identity Reviews
    Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc
  • 19
    Citrix Workspace Reviews

    Citrix Workspace

    Cloud Software Group

    An intelligent workspace will improve employee experience. Work smarter and more flexible. You have hired the best. Let them be the best. Citrix Workspace redefines what it means to be productive. Simpler IT can increase employee productivity and engagement. You can simplify the way you manage, secure, and administer apps, devices, users, networks, so that you can provide the best employee experience. Easily return employees to the office. Your cloud strategy can be used to its full potential. Replace traditional VPNs by a zero trust approach.
  • 20
    Nightfall Reviews
    Protect your sensitive data by identifying, classifying, and classifying it. Nightfall™, which uses machine learning to identify sensitive data such as customer PII across your SaaS, APIs and data infrastructure, allows you to manage and protect it. To monitor your data, integrate with cloud services via APIs in minutes. Machine learning accurately classifies sensitive data and PII, so nothing is missed. Automated workflows can be set up to save time and keep your business safe. Nightfall integrates directly to all your SaaS, APIs and data infrastructure. Nightfall APIs are available for sensitive data protection and classification. You can programmatically access structured results from Nightfall’s deep learning-based detectors, such as API keys and credit card numbers. Just a few lines of code are required to integrate. Nightfall's REST API allows you to easily add data classifications to your applications and workflows.
  • 21
    Fastpath Reviews
    Fastpath's cloud based access orchestration allows organizations to manage, automate, and streamline identity, access governance and data and configuration updates - efficiently and effectively. Our intuitive cloud platform integrates GRC and identity governance into a sophisticated, yet easy-to use solution. Automate, control and monitor access to applications, data records and individual data records, all without effort. Fastpath's platform has been designed by auditors, who understand the complexity involved in securing access to business applications. We created a solution to reduce the time, costs and complexity of audit processes and reporting in order to prove compliance.
  • 22
    Gurucul Reviews
    Advanced threat detection, remediation, and response can be automated using data science-driven security controls. Gurucul's Unified Security and Risk Analytics platform addresses the question: Is anomalous behaviour risky? This is our competitive advantage, and why we are different from everyone else in this market. We won't waste your time alerting you to anomalous activity that isn’t risky. To determine if behavior is dangerous, we use context. Context is crucial. It is not helpful to tell you what is happening. Gurucul difference is telling you when something is wrong. This is information you can use to make decisions. We put your data to use. We are the only security company that can access all of your data outside of the box. We can ingest data of any source: SIEMs, CRMs and electronic medical records, identity management systems, endpoints, etc.
  • 23
    Cyber360 Reviews
    With a best-in class cloud platform, streamline cybersecurity assessments and transform your practice so you can serve more clients. You can identify, analyze, and mitigate cybersecurity risk with full transparency. Flexible, out-of-the box workflows and controls allow for flexibility while increasing efficiency. Create a repeatable cybersecurity assessment process that is tailored to your organization's needs. You can see the risk profile of your organization across business units, third parties, and regions. All assessments, documents, policies, and issues should be gathered and stored in a central repository. Analytics, alerts, and collaboration can be used to prevent exceptions. You can use pre-built or pre-seeded industry assessment template templates or upload your standard practice questionnaire. There are many options for assessments. These include self assessments, onsite assessments and others.
  • 24
    ETI Reviews

    ETI

    ETI Software Solutions

    Customers can self-serve using an easy-to use web portal. Smart, simple customer service views offer real-time data to optimize customer interactions. Predictive analysis and proactive engagement transform the speed and quality in issues resolution. Monitoring and service assurance in real-time for CPE management. This will reduce inefficiencies and costs, improve subscriber experience, enable next-generation services, and lower costs. Advanced analytics and visualizations are used to solve business-level problems, make proactive decisions, and improve operations management from sales/marketing to workforce management. Optimize network performance, uptime and reliability. Trending and reporting on network performance.
  • 25
    DataGuard Reviews
    Our AI-powered platform will help you get certified quickly. Understand, identify and manage security and compliance risks. We help customers overcome these challenges by integrating a security posture with their overall objectives using a unique, iterative, and risk-based method. We help businesses achieve robust digital security management and compliance with 40% less effort, and a more efficient budget. Our AI-powered platform automates repetitive work, simplifies compliance to complex regulations and frameworks and helps mitigate risks before they disrupt business. Our in-house experts can provide additional support if needed, advising on all security and compliance challenges for organizations now and in the future.
  • Previous
  • You're on page 1
  • 2
  • Next