Best LogonBox Alternatives in 2025
Find the top alternatives to LogonBox currently available. Compare ratings, reviews, pricing, and features of LogonBox alternatives in 2025. Slashdot lists the best LogonBox alternatives on the market that offer competing products that are similar to LogonBox. Sort through LogonBox alternatives below to make the best choice for your needs
-
1
Cisco Duo
Cisco
1,290 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Auth0
Okta
817 RatingsAuth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. -
3
ManageEngine ADSelfService Plus
ManageEngine
108 RatingsBoth IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place. -
4
Uniqkey
Uniqkey
175 RatingsUniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind. -
5
JumpCloud
JumpCloud
3,325 RatingsSmall and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free. -
6
Securden Unified PAM
Securden
Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards. -
7
Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
-
8
Zluri
Zluri
Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio. -
9
N-able™, Passportal™, provides simple, yet secure password management and documentation management that is tailored to the needs of MSPs and ITSPs. The platform is cloud-based, offering channel partners automated password protection. It makes it easy to store, manage, and retrieve passwords and client information from any connected device. N-able™, Passportal™, also offers value-added services products such as Documentation Manager™, Site™, and Blink™. These products promote compliance with industry regulations, protect businesses against data breaches, cybersecurity threats and network vulnerabilities.
-
10
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
11
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
12
Oracle Identity Management
Oracle
Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform. -
13
Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
-
14
Core Security Access Assurance Suite
Core Security (Fortra)
Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets. -
15
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
16
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
17
EmpowerID
EmpowerID
$2 per user per monthEmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business. -
18
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
19
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
20
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
21
Vault One
VaultOne Software
$99 per monthYou have complete control over who has access to your data, systems and infrastructure. This will prevent cyber attacks and data breaches. VaultOne helps you to protect your company's assets and ensure compliance. VaultOne is reinventing the concept behind privileged access management (PAM). VaultOne is reinventing the concept of privileged access management (PAM). It allows you to manage user access, credentials, and sessions in a fast and secure way. We offer multiple features such as a digital vault, password generator and sessions recording, auditing, reporting, customizable policies and disaster recovery. You've found the right solution to protect shared accounts, certificates, and user access to websites, applications, servers, databases and cloud services. You can prevent data breaches by creating custom access policies and managing privileges. -
22
IDReset
Interactive Northwest
Self-service password recovery applications are designed to reduce helpdesk workload by providing users with a secure way to reset their accounts online or via phone. INI provides automated password reset solutions that meet both the security needs of an organization and its users' expectations. Helpdesk calls cost between $10 and $30 per call. A self-service password reset app automates the process and allows organizations to see a return on their investment within the first year. The organization's productivity is significantly improved by the use of the application, as well as the IT, finance, and helpdesk personnel. This adds considerable value to the bottom line. Security is improved by removing the agent during authentication. You have 24/7 access. Increase ROI by reducing helpdesk calls by 20%-40% This allows helpdesk staff to focus on mission-critical issues. -
23
Ilantus Compact Identity
Ilantus Technologies
It is the first time that an IAM solution is available that is comprehensive, deep, and easy to implement even by non-IT personnel. This includes Access Management, Identity Governance and Administration. You can implement the solution step by step and at your own pace with an online digital guidance system. Ilantus offers free implementation support, unlike other vendors. Seamless SSO with "no app left behind", including on-premise or thick-client apps. All web apps, whether they are federated, non federated or thick-client, legacy, custom, or other apps, will be included in your SSO environment. Support is also available for mobile apps and IOT devices. What is your homegrown app? This will not be a problem thanks to our interactive digital help guide. If you need help, you can call Ilantus' dedicated helpline, available 24 hours a day, Monday through Friday, and we will assist you with the integration. -
24
Delinea Secret Server
Delinea
Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials. -
25
Bravura Pass
Bravura Security
Bravura Pass is an integrated solution that allows you to manage credentials across multiple systems and applications. It makes it easy to manage passwords, tokens smart cards, security questions, and biometrics. Bravura Pass reduces IT support costs and improves security of login processes. Bravura Pass includes password sync, self-service password reset and PIN reset as well as strong authentication, federated and federated access, enrollment in biometrics and security questions, and self-service unlocking of encrypted drives. -
26
TeamPassword is a cloud-based password management system for all sizes of teams. TeamPassword was designed with collaboration and ease-of-use in mind. It allows teams to access and manage shared apps, services, tools, and other tools. TeamPassword uses secure encryption technology to protect sensitive information.
-
27
FastPass strengthens user protection against identity theft. The integration of FastPass SSPR and FastPass IVM within FastPass Enterprise enhances productivity for both end-users and help desk support, concurrently serving as a defense against social engineering threats aimed at the service desk. To thwart password theft at the help desk, a secure IT workflow is imperative. FastPass IVM, available as a certified cloud or on-premises solution, delivers dynamic and contextual verification. Tailored to specific user groups based on security policies, this solution leverages insights into the user's device usage and multi-factor authentication (MFAs), establishing a secure defense against hacker attempts. FastPass SSPR presents an advanced self-service solution for password resets and unlocks. Seamlessly accommodating passwords from AD, Entra, SAP, IBM, Oracle, LDAP, and other systems, it ensures a secure approach to user authentication. MFA and manager approval for verification in addition to Q/A. Password reset for WFH users with local password cache update.
-
28
WSO2 Identity Server
WSO2
WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience. -
29
UserBase
Encodable
$39 one-time paymentUserBase is a login and password manager for your website. It is a simple web app that allows user authentication. UserBase is simple to install, even if you are not a tech-savvy. We can also install it for your today. It can be installed on any website or server because it only requires Perl and MySQL. Administrators have full control over account creation. They can add/delete accounts, and public sign up can be disabled. Public sign-ups can also be made to require admin approval or email verification before they become active. You can customize the sign-up page for users with unlimited fields. This allows you to collect any user information that is relevant to your site. Users can change their passwords and have them reset via email if they are lost. This is done without the need to contact the webmaster. For protection against brute force attacks, users can sleep for a set amount of seconds if they fail to log in. -
30
Deepnet DualShield
Deepnet Security
You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe. -
31
SAASPASS
SAASPASS
$10 per monthThe Only Full-Stack Identity & Management Solution that goes beyond passwords. SAASPASS is your key to the world. Say Goodbye To Passwords Everywhere. Secure Authentication Made Magical. Personal Use Protect yourself. Protect your company admins. Protect your employees. Developers. Protect Your End Users. You can instantly control and manage network access for employees and partners. Eliminate manual password typing and the associated resources for password complexity rules and resets. One, simple-to-use solutions can replace single sign-on products and ID cards. Use out-of-band MFA to secure every access point to your corporate network and personal data. Instantly log in to your Mac or computer with full MFA. Securely and seamlessly authenticate to cloud-based or on-premise applications. Reduce the impact of password and data breaches on your organization. Reduce the risks and costs -
32
Imprivata
Imprivata
Imprivata is the digital identity company. Imprivata's understanding of complex healthcare workflows has made it the world's leader in trusted digital ID management for health delivery organisations. Imprivata is the leader in trusted digital identification management for healthcare delivery organizations because of our deep understanding of complex healthcare workflows. Imprivata provides enterprise access, multifactor authentication and identity governance. Our solutions are developed in close collaboration with clinicians to ensure that efficiency and security are always considered. Imprivata solutions are compatible with the Imprivata Digital Identity Framework, which provides a unified strategy for managing identities across healthcare delivery organizations. -
33
Jamf Connect
Jamf
$2 per user per month 1 RatingOrganizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements. -
34
Xpress Password
Ilantus
Xpress Password, a self-service Enterprise Password Management product, allows users to reset their passwords and reduce their dependence on helpdesk. True Enterprise class password management product. Remote password reset with enhanced performance are some of the unique features. Service providers have many options to choose from in order to take on large numbers of customers using the consumption model. It is highly customizable to meet customer needs. Enterprise Password Management is now more efficient with seamless Password Sync, Password Recovery and registration-free Password Management. Users can reset passwords securely and seamlessly without the need to register to Xpress Password. Xpress Password allows users to access self-service capabilities even when they are locked out of their workstations. It also includes a CP Gina agent. It also allows users to reset their password while on the move. -
35
ManageEngine AD360
Zoho
$595.00 /year AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV. -
36
Entrust Identity Enterprise
Entrust
Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one. -
37
Sysgem Password Management
Sysgem
These tools are effective in optimizing day-to-day password management. They can be used to ensure compliance with regulatory and corporate security regulations and free up your helpdesk. Sysgem Self-Service password reset must be installed in three parts. The domain controller should host the central service. The web enrolment system should be installed on any IIS server within the domain. End-users should also install the workstation component on their workstations in order to reset their passwords on demand. The Domain Controller runs a Windows Service that resets passwords for end users. It also has a database of questions, which are created and used to verify the identity of the person who wishes to reset their password. -
38
TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
-
39
Arnica UnifiedLogon
Arnica Software
Arnica UnifiedLogon, an identity management system, provides access control, personalization, configuration services and allows you implement single-point user login-on for multiple applications. It's a powerful tool to manage user access to applications, resources, and functions. All of this can be done through a web browser. Arnica UnifiedLogon is a highly scalable system that can manage any number of users, from a few local users in a small business to thousands of users in large enterprises to millions of users on a public website. Arnica UnifiedLogon offers many ways to maintain and extend user profile data at a virtually infinite level of complexity. -
40
CionSystems
CionSystems
Access to a privileged account is responsible for 74% of all breaches. Security gaps and risks have increased due to mass migration to remote workforce enterprise operations. Enterprise identity manager is a "out of the box" solution that dramatically simplifies, simplifies, and secures enterprise Active Directory deployments. It does not require any scripts or code. EIM allows rapid transition of Active Directory to manage large remote workforces. It provides real-time tracking and notifications of all changes. Active Directory is used by more than 90% of businesses worldwide. Complex cloud migration and synchronization can lead to security gaps. Cloud Office 365 simplifies the tedious task of managing Internet user accounts. It dramatically reduces the time needed to provision and de-provision users, provides real-time tracking and significantly reduces unused and untracked licensing costs. -
41
Password Reset PRO
SysOp Tools
$598.00/one-time/ user Identity management and self-service password reset software (SSPR), for Active Directory 2012, 2016, 2019, domain users. Remote users can access the password service remotely. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deployment - No databases - Get it for free for a month! Supported for Server 2003 to 2019. Password Reset PRO is an enterprise-class web-based self-service software that allows end users to quickly change their domain password or unlock their account. It is easy to install, test, and deploy. There are no domain changes or databases required. -
42
Core Password
Core Security (Fortra)
Organizations can be burdened by inefficient or manual password management, which can lead to increased security risks and costs. A strong self-service password management system, which automates password resets and enforces stronger password policies, can reduce IT resource dependence and lower access risks. Core Security offers a complete and integrated solution for automated password management. Core Password and Secure Reset combine to offer a secure and convenient password reset solution for your company. Core Password is the industry's best solution for password management. Core Password is a leading self-service password recovery tool. It offers multiple access options, robust integration with the service desk, and the ability enforce consistent password policies across any system, application, web portal, or other system. -
43
Visual Identity Suite
Core Security (Fortra)
Visual Identity Suite (VIS), previously offered by Courion as part of its Core Security Identity Governance and Administration portfolio, empowers organizations to view user privileges and access certificates in a new way. It uses an intelligent, visual-first approach. You can quickly identify outliers and see common user entitlements using an intuitive graphical interface. This allows you to quickly identify the right people to access what information. VIS allows you to see what access looks like within your business so that you can manage identity chaos and mitigate identity risk. Intelligent and visible identity governance across all your environments is essential for reducing identity risk within your organization. To simplify your identity governance and administration, you should use a visual-first approach to the creation and management access reviews and roles. -
44
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications. -
45
Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
-
46
DoubleClue
DoubleClue
DoubleClue, an Identity and Access Management Platform from HWS Group in Bavaria, allows you to manage access rights and identities. It protects company networks from cyberattacks that target digital identities/the "human factor" by using modern multi-factor authentication. The platform also offers integrated password management and secure cloud storage to protect confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On-premises or in the cloud. DoubleClue protects any part of your business that isn't covered by firewalls or virus scanners. This includes the human factor, which is the most vulnerable component in any IT security. A strong, all-in-one platform protects all digital accesses, applications, passwords, and confidential data. Employees expect maximum flexibility in the digital workplace. Allow them to work anywhere, on any device, without compromising their IT security. -
47
RapidScale Identity as a Service
RapidScale
RapidScale's Identity as a Service is ideal for organizations that need to make network access simple for staff without compromising security. Our IDaaS solution is built on the backbone Azure Active Directory and provides powerful security right out of the box. No matter where your applications and critical data are located, you can protect them. There are options for single sign-on (SSO), multifactor authentication (MFA), password syncization, and many other features. Our identity services options make it easy to increase your login security. Advanced password sync functions such as user password reset, changing, writeback, and more can be used to control access. Our full-service portal makes it easy to manage IDaaS services, as well as other RapidScale solutions. Alternately let us manage your IDaaS deployment. -
48
Specops uReset
Specops Software
Are account lockouts and password resets consuming valuable IT resources? Allow users to address common tasks in password management, including Active Directory self service password resets, password changes, and account locksouts. Specops uReset is a flexible authentication engine that revolutionizes password resets. It ensures that users have a secure method to reset their password regardless of where they are located, what device they use, or what browser they are using. -
49
Every organization should consider Secure Identity & Access Management due to the increasing number of remote workers, increased dependence on cloud applications, as well as explosive increases in cyber theft. IT teams can quickly, easily, and economically enable the right people to access the right resources using Passly™, a Kaseya company. Secure Password Management, Single Sign On, Multi-Factor authentication, and many more. It's crucial to choose the right secure identity and access management platform in a world where cyberattacks are more common than ever. Nearly 80% of all data breaches are due to weak passwords. Passly is the most cost-effective and comprehensive solution to ensure security, compliance, efficiency, and compliance. Techs can store and manage passwords for personal, business, or shared accounts using shared password vaults. It is centralized and easy-to-use
-
50
PeoplePlatform
Web Active Directory
PeoplePlatform allows for you to automate and delegate all common tasks related to Identity Management. Instead of spending time on directory updates, provisioning, and deprovisioning, empower your organization to manage these tasks via a simple web interface. Create simple web interfaces that can handle even the most complicated identity management tasks within your organization. Single and bulk deprovisioning - allows users to be removed from your organization's resources. Handle Workflows – Workflow jobs can set up to run after an object has been provisioned.