Best Ok Goldy Alternatives in 2024

Find the top alternatives to Ok Goldy currently available. Compare ratings, reviews, pricing, and features of Ok Goldy alternatives in 2024. Slashdot lists the best Ok Goldy alternatives on the market that offer competing products that are similar to Ok Goldy. Sort through Ok Goldy alternatives below to make the best choice for your needs

  • 1
    Cisco Duo Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 2
    ManageEngine ADManager Plus Reviews
    See Software
    Learn More
    Compare Both
    ADManager Plus is an easy-to use Windows Active Directory (AD), management and reporting solution that aids AD administrators and help desk personnel in their day to day activities. The software has a web-based GUI that is intuitive and central. It handles complex tasks such as bulk management of user accounts, other AD objects, and delegate role-based access for help desk technicians. It also generates a comprehensive list of AD reports, which are essential to satisfy compliance audits. The Active Directory tool also includes mobile AD apps that enable AD technicians and administrators to perform user management tasks on the go, right from their mobile devices.
  • 3
    SecurEnds Reviews
    SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations.
  • 4
    Frontegg Reviews
    Top Pick
    Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
  • 5
    AvePoint Reviews
    AvePoint is the only provider of complete data management solutions for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service userbase in the Microsoft 365 ecosystem. AvePoint is trusted by more than 7 million people worldwide to manage and protect their cloud investments. Our SaaS platform offers enterprise-grade support and hyperscale security. We are available in 12 Azure data centers. Our products are available in 4 languages. We offer 24/7 support and have market-leading security credentials like FedRAMP and ISO 27001 in-process. Organizations that leverage Microsoft's comprehensive and integrated product portfolio can get additional value without having to manage multiple vendors. These SaaS products are part of the AOS platform: o Cloud Backup o Cloud Management o Cloud Governance o Cloud Insights o Cloud Records Policies and Insights o MyHub
  • 6
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 7
    Entitle Reviews
    Entitle blends a security-first approach in provisioning and governance with a commitment for business enablement for all employees, from R&D and Sales to H&R to finance. To speed up provisioning, security policies can be automatically updated to reflect changes in infrastructure and employee requirements. Permissions can be granted to specific resources such as Google Drive folders and database tables, Git repositories, or other resources. Protect privileged roles and resources by only granting access when necessary, and removing them when they are not. For authorizations you can trust, give access requests to peers, managers, resource owners, and managers. DevOps and IT can save significant time and resources by using automated access requests and zero touch provisioning. For a seamless approval process, users can request access via Slack or Teams, Jira or email. To keep up with organizational changes, grant bulk permissions to speed onboarding and offboarding.
  • 8
    SysTools Active Directory Management Reviews
    Active directory management tool allows you to edit, remove, and create bulk users in AD. Batch migration of users to a new domain active directory. You can view, manage, and preview active directory user accounts right from your computer. You can rollback changes to active directory. From the software home screen, create multiple users in active directories. Allows you to move user accounts from one OU to another OU. It allows you to search, delete, modify, rename, or create an organizational unit in AD. Password and username for Active Directory Admin are required. MS Exchange Server must be active and available on the user's machine. The administrator of AD Console can perform multiple tasks from one panel. You can perform multiple operations, such as creating a new user or an organizational unit, deleting user, changing user attributes, moving AD user to another OU and undoing all changes using rollback options.
  • 9
    Deep Identity Reviews
    Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc
  • 10
    Vyapin Microsoft 365 Manager Reviews
    Vyapin Microsoft 365 Manager provides a single-stop O365 solution. It manages Users, Groups Licenses Permissions & More. The software automates Office 365 License Management, User provisioning, deprovisioning in bulk, administration, security groups, distribution groups, mailbox permissions management, and user provisioning and deprovisioning. You can manage Office 365 from your desktop with just a few clicks. This ensures that Office 365's security and health are never compromised. The native Office 365 Management portal is not able to automate large-scale administrative tasks. Administrators must perform a series tasks to enable users to start working immediately after they are provisioned.
  • 11
    DynamicGroup Reviews
    FirstWare DynamicGroup can automate group memberships for AD objects. It speeds up processes and reduces workload for IT-departments. It allows for real-time savings and better security thanks to group memberships that are always up-to date. It's easy to organize groups in Active Directory. With DynamicGroup IT-administrators, group memberships can be arranged in just seconds.
  • 12
    AWS Directory Service Reviews
    AWS Directory Service to Microsoft Active Directory, also known AWS Managed Microsoft Active Directory (AD), allows you to use managed Active Directory in AWS with your directory-aware workloads. AWS Managed Microsoft AD is based on Microsoft Active Directory and does not require that you synchronize or replicate your data to the cloud. You can use the standard AD administration tools, and you can take advantage of the built in AD features such as Group Policy or single sign-on. AWS Managed Microsoft AD allows you to join Amazon EC2 or Amazon RDS for SQL Server instances in your domain and use AWS End User Computing services (EUC), such as Amazon WorkSpaces with AD users and groups. AWS Managed Microsoft AD makes it simple to migrate AD-dependent Windows workloads to AWS. AWS Managed Microsoft AD allows you to use Group Policies to manage EC2 instances, and run AD-dependent apps in the AWS Cloud.
  • 13
    BAAR-IGA Reviews

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications.
  • 14
    Bravura Identity Reviews
    Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access.
  • 15
    JumpCloud Reviews
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 16
    Authomize Reviews
    Authomize continuously detects any effective relationships between human and machine identities to company resources throughout all your organization's environments. (IaaS. PaaS. SaaS. Data. On-prem). This includes the most detailed company asset, and it is normalized consistently across all apps. Authomize keeps you informed about your identities, assets, and access policies. It can block unintended access by using guardrails, alerts on anomalies, and alerts on other risks. Authomize's AI engine harnesses its detailed and granular view of all environments in an organization to create the best access policies for any relationship between identity and asset. SmartGroup technology performs continuous access modelling, self-correcting because it incorporates new inputs like actual usage, activities, and decisions to create an optimal permission structure.
  • 17
    PeoplePlatform Reviews
    PeoplePlatform allows for you to automate and delegate all common tasks related to Identity Management. Instead of spending time on directory updates, provisioning, and deprovisioning, empower your organization to manage these tasks via a simple web interface. Create simple web interfaces that can handle even the most complicated identity management tasks within your organization. Single and bulk deprovisioning - allows users to be removed from your organization's resources. Handle Workflows – Workflow jobs can set up to run after an object has been provisioned.
  • 18
    ManageEngine M365 Manager Plus Reviews
    M365 Manager Plus is a comprehensive Microsoft 365 tool that can be used to report, manage, monitor, audit, and create alerts for critical activities. It is easy to manage Microsoft 365 services such as Exchange Online, OneDrive for Business and Skype for Business from one place. M365 Manager Plus offers extensive pre-configured reports on Microsoft 365. It helps you perform complex tasks such as bulk user management, bulk mail management, secure delegation, and bulk mailbox management. You can monitor Microsoft 365 services 24/7 and receive email notifications about service interruptions. M365 Manager Plus simplifies compliance management with built in compliance reports. It also offers advanced auditing, alerting, and reporting features to help keep your Microsoft 365 setup safe.
  • 19
    ShareGate Reviews

    ShareGate

    Workleap

    $4,495 per year
    To gain visibility on your teams, and Microsoft 365 groups, skip the tedious task of searching through multiple admin centers. Connect your tenant with ShareGate, and in just a few seconds you can see who created the teams, why they were created and whether they are currently being used. If so, how. ShareGate crawls your tenant every day and finds unused groups and teams. You can archive or delete them with a single click to reduce the amount of clutter and make it easier to find what you're looking for in Microsoft 365. The ShareGate Teams chatbot allows you to collect valuable information from owners in order to understand the purpose and level of sensitivity of each team. This will allow you to assess the risk for your business and make the best decisions about their teams. You can adjust the level of security you provide to each team. ShareGate makes it easy to access all the PowerShell scripts that you would have written yourself. Allow users to have more control over their tools. You can easily set up guardrails for more security and peace of mind.
  • 20
    Apache Syncope Reviews

    Apache Syncope

    Apache Software Foundation

    Apache Syncope, an Open Source system to manage digital identities in enterprise environments is available under the Apache 2.0 license. It was developed in Java EE technology. Identity management (or IdM), refers to managing user data on applications and systems using a combination of business processes as well as IT. Computers use data about people to make decisions. These records contain technical information that is required by the system to create and manage the account. Are you a former employee of a company, a member of an organization, or have you just created a Google account? Companies, organizations, and cloud entities all work with applications that require your data to function properly. This includes username, password and e-mail. Identity Management, in short, is responsible for managing identity data throughout the Identity Lifecycle.
  • 21
    Heimdal Application Control Reviews
    Heimdal Application Control offers a new approach to integrative app management and user rights curation. App Control is modular and easy to set-up. It allows the system administrator to create all encompassing rule-based frameworks and streamline auto-dismissal and auto-approval flows. It also enforces individual rights per Active Directory group. The uniqueness of the tool comes from its ability, in perfect coordination with a (PAM), Privileged Access Management solution. This allows for the user to have granular oversight over software inventories and hardware assets.
  • 22
    Quest Active Administrator Reviews
    Administrators will have a difficult time managing critical Microsoft AD environments if they don't have the right Active Directory management tools. Doing more with less can increase the risk of accidental changes to AD objects, configurations, and Group Policy data. This can increase your risk of errors and downtime. This is only made more difficult by the need to enforce internal policies, and comply with compliance regulations. Active Administrator is a comprehensive and integrated Microsoft AD management solution that allows you to move faster and more efficiently than native tools. You can quickly address auditing requirements and meet security needs with one consolidated view of the management of your Active Directory. You can maintain business continuity, improve IT efficiency, and minimize security risks by integrating AD administration and seamless authorizations management.
  • 23
    Netwrix Usercube Reviews
    Identity Governance and Administration (IGA), a combination of all the processes within an organization, allows each identified individual to have the right access rights at the correct time and for the right reasons. The directory is powered through real-time movement, administrative tasks, and personal updates via the self-service screen. This ensures that the information is accurate at all times. People move frequently within organizations (hires and departures, subsidiary creations. Office closings. Reorganizations. Moves). The company's organization is modelled in Usercube so workflows can be sent to the appropriate people in real-time. This makes the actors more efficient and reduces wasted time. Easy generation of compliance reports is possible due to the easy access to the repository and the traceability for all requests.
  • 24
    BalkanID Reviews
    Use AI to automate the discovery and prioritization of risk for entitlement sprawl. Streamline access certifications and reviews across the SaaS and public cloud landscape. All third-party integrations can be connected to the BalkanID dashboard. Integrations are available for the most popular SaaS apps. Single pane of glass is available for both coarse-grained and fine-grained entitlements. It can also be used to handle outliers in SaaS or public cloud environments. Facilitate access review and certification across SaaS and public clouds. Data science and machine learning can be used to gain visibility into entitlement risks in SaaS and public clouds environments. Prioritization and discovery of entitlement risks. To ensure that access reviews are not too high-level, there is still detailed data (permissions and roles, groups, etc.). to support certification actions.
  • 25
    Visual Identity Suite Reviews
    Visual Identity Suite (VIS), previously offered by Courion as part of its Core Security Identity Governance and Administration portfolio, empowers organizations to view user privileges and access certificates in a new way. It uses an intelligent, visual-first approach. You can quickly identify outliers and see common user entitlements using an intuitive graphical interface. This allows you to quickly identify the right people to access what information. VIS allows you to see what access looks like within your business so that you can manage identity chaos and mitigate identity risk. Intelligent and visible identity governance across all your environments is essential for reducing identity risk within your organization. To simplify your identity governance and administration, you should use a visual-first approach to the creation and management access reviews and roles.
  • 26
    Hyena Reviews

    Hyena

    SystemTools Software

    $329
    Hyena has been used by thousands of system administrators around the world for over twenty-five (25) years. It is widely known in the industry as one the best Active Directory and Windows management tools available... at any price! It's designed to simplify and centralize almost all of the day-today management tasks while also providing new capabilities for system administration. All of this functionality is available in one, centralized, and easy-to-use product. You can manage all aspects of your organization's Windows 2003, Windows 2019 and other versions with one tool. Hyena, our award-winning Active Directory management software and Windows system management software, now offers multiple ways to mass update Active Directory information. You can use the Active Task feature to mass update and import Active Directory information or the Active Editor, which allows you to freely move around and make changes to directory information.
  • 27
    Core Security Access Assurance Suite Reviews
    Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets.
  • 28
    GPOADmin Reviews
    Simplify Active Directory group policy and governance management. GPOADmin, a third-party solution for group policy management and governance, allows you to search and administer, verify, compare and update GPOs. This will ensure consistency and prevent long-term GPO proliferation. GPO comparison features, enhanced security and workflow capabilities, allow you to control and secure your Windows infrastructure while supporting governance efforts. GPOs are critical. Even though it may seem innocuous, one wrong GPO can have a huge impact on the security of thousands of systems within your network. GPOADmin automates critical Group Policy management tasks and governance tasks, reducing risk and eliminating manual processes. GPO auditing can be improved and verified consistency quickly and easily using advanced, side-by sides GPO version comparisons at different intervals.
  • 29
    XONA Reviews
    XONA provides frictionless access for operational technology (OT), and other critical infrastructure systems. XONA's protocol isolation and zero trust architecture instantly eliminate common attack vectors. It can be configured in minutes and technology-agnostic. Authorized users have seamless and secure access to operational technology from any device or location. XONA integrates multi-factor authentication, user to-asset access controls and user session analytics. This secure portal connects the cyber-physical universe and allows critical operations to take place from anywhere. XONA allows users to securely connect to critical systems and assets from anywhere. Watch how a technician logs into a XONA SSG and authenticates. This allows them to connect to an HMI remotely and resolve any issues.
  • 30
    SysKit Point Reviews
    Your end-users should be empowered to participate in Office 365 governance. To reduce tenant clutter, ask your Microsoft Teams, Microsoft 365 Groups and site owners to manage inactive resources regularly. Regular access reviews should be scheduled for resource owners to ensure that the right people have access. A central web interface gives you a complete overview of your Office 365 environment, including ownership and rights across Microsoft Teams, SharePoint Online and Microsoft 365 Groups. Easy-to-read security reports can be created and used to proactively manage access and users. Coripharma is in a highlyregulated industry and needed a central point to track who has access to what. SysKit Point has allowed Coripharma to save half the work they used and provide a quick central point for access management and overview that helps them comply with all laws and regulations.
  • 31
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security defense must be able to stop both internal and external threats. One common factor unites external and internal threats. The end user's compliance with security, policy, best practices. External elements can exploit an unacquainting internal user's compliance to sound security policies to gain entry. Although external threats can be dealt with using various mechanisms, such as firewalls and other security tools, it is inherently rooted in internal weaknesses. You can reduce internal threats by simply creating "automatic and enforceable" security policies. This will require end-users adhere to secure access protocols using trusted credentials. LogMeOnce Patented technology offers many ways to protect your agency, team members, and credentials with advanced automated authentication. LogmeOnce dashboard gives users powerful and unified access across all their applications.
  • 32
    my-IAM TeamSpace Reviews
    My-IAM TeamSpace allows you to create a compliance-oriented approach to working with Microsoft Teams. IT admins as well as users can use my-IAM TeamSpace to manage and manage teams. M365 admins create security settings for teams. They categorize them and map them into templates. In advance, the roles, permissions, data security, and granular customizations of each team member are set. The great advantage is that employees take over the controlled and controlled administration of teams.
  • 33
    Youzer Reviews
    This unique user repository provides information about the arrivals and departures for employees, temporary workers, service providers, and others. In real-time. You can launch account suspension/creation actions with packages you have created. Youzer connects with all your applications to monitor and analyse all access accounts. Regularly verify the alignment of each employee’s authorisations. Everyone has the right to access what they need. Regular analysis of accounts that are missing authorizations, inconsistent authorisations, access rights, sensitive security groups, and other issues is necessary. A sales person, a technician, a consultant... The profile of the user that arrives will determine which account needs to be created. You can create the right accounts for the right people with the resource packages.
  • 34
    ETI Reviews

    ETI

    ETI Software Solutions

    Customers can self-serve using an easy-to use web portal. Smart, simple customer service views offer real-time data to optimize customer interactions. Predictive analysis and proactive engagement transform the speed and quality in issues resolution. Monitoring and service assurance in real-time for CPE management. This will reduce inefficiencies and costs, improve subscriber experience, enable next-generation services, and lower costs. Advanced analytics and visualizations are used to solve business-level problems, make proactive decisions, and improve operations management from sales/marketing to workforce management. Optimize network performance, uptime and reliability. Trending and reporting on network performance.
  • 35
    Symantec IGA Reviews
    Although user experience and instantaneous access have become the norm, the IT infrastructure supporting these efforts has grown exponentially more complex. IT organizations are under constant pressure to reduce operational costs while still complying with increasing numbers of industry and government regulations. IT organizations must allow more people to access different applications in a shorter time span, while still being accountable to a multitude of parties who control access. Identity governance and administration technologies today must be able provide broad provisioning support for both on-premises as well as cloud apps. They also need entitlements certification to verify that privileges are appropriate. All this while scaling to store millions.
  • 36
    Sysgem Enterprise Manager Reviews
    Flexible and modular tools that monitor and manage systems, administer user accounts, and audit security from one screen - Windows, UNIX/Linux and OpenVMS - are available. SEM provides the three core modules Sysgem System Manager, Sysgem Account Manager and Sysgem Fil Synchronizer (SFiS), which all run on the SEM framework. Unify, simplify, and integrate core system administration solutions across a multiplatform environment. Unify user account management across a multi-platform, multi-application environment. Control the distribution and deployment of configuration files across infrastructure.
  • 37
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 38
    Blissfully Reviews
    All your technology assets and workflows can be managed in one IT platform. Blissfully helps hundreds of companies in all industries manage their IT, including many top tech companies. SaaS Management and SO MUCH MORE. Blissfully was a key contributor to the creation and continues to lead the SaaS management category. However, we view it as part of a larger IT platform. Blissfully unites disparate data and systems to create a comprehensive IT platform. Our top priority is to earn and maintain our customers' trust. We invest heavily in policies, controls, technical security, as well as a culture that focuses on vigilance. Establish and maintain a single source for truth regarding technology. Define and implement consistent IT processes. Engage and empower everyone within your organization. Consistent execution is key to building and maintaining confidence.
  • 39
    Amazon Verified Permissions Reviews
    Amazon Verified Permissions, a fully-managed authorization service, uses the Cedar policy language that is proven to be correct. This allows you to build more secure applications. Verified Permissions allows developers to build applications faster through the centralization of policy management and externalization of authorization. They can also align authorization in the application with Zero trust principles. Teams from security and audit can better audit and analyze who has access to which applications. Decouple authorization from business logic to accelerate application development. Protect application resources, and manage user access according to the principle of least priviledge. Amazon Verified Permissions provides a managed permissions management service that is Cedar-compatible. It also allows you to fine-grained authorize your applications. Cedar is an expressive, performant and analyzable policy language that allows developers and administrators to define policy-based controls.
  • 40
    ActivID Reviews
    Flexible, flexible, and highly scalable platform that allows you to secure access to corporate systems and online consumer services. Multi-factor authentication to secure remote access by employees to corporate VPNs, and other enterprise resources. Multi-factor authentication to secure remote access by employees to corporate VPNs, and other enterprise resources. Rapidly create and deliver authentication solutions to ensure compliance and trust. Secure authentication using smart cards to protect workstations, mobile devices, and networks. Solution for issuing and managing PIV, PIV-I and enterprise access cards, mobile credentials, and managing PIV cards. HID PIV IDMS enables identity verification and securely issues credentials, even to remote users. Securely and efficiently issue a card through the Leverage Service Bureau.
  • 41
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 42
    Phonism Reviews

    Phonism

    Phonism

    $200 per month
    Phonism was created to simplify today's complex VoIP market. You can configure and provision all your VoIP devices using one interface. You can now configure your VoIP devices using their Web GUI or stop editing configuration files manually. You can configure lines, busy lamp fields, soft keys, sidecars and many other configurations without ever opening a text editor. Need even more flexibility? If you need raw configuration, our Custom Config feature allows you to do so. The Visual Button Manager makes it easy to customize device keys! Our drag-and-drop tool makes it easy to customize your device without the need of a technician or an on-site visit. Administrators can use Phonism's Templates to create common settings with the same interface. You can apply templates to one device or an entire deployment. Changing voice servers? Change the address of your voice server in your Template, and all your devices will be updated automatically.
  • 43
    HelloID Reviews

    HelloID

    Tools4ever

    2.18/month/user
    HelloID is a modern and secure cloud-based Identity & Access Management (IAM) solution that empowers educational institutions and organizations to take control of their complex user provisioning, self-service, and single sign-on needs. Automate the entire user lifecycle process with HelloID by connecting your HR or SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of Identity Management into your hands to meet your current and future needs.
  • 44
    Cerby Reviews

    Cerby

    Cerby

    $20,000 per year
    Cerby automates your brand's protection against common application misconfigurations, such as shared passwords or disabled 2FA. This prevents attackers from exploiting them. Cerby uses a combination robotic process automation and programmatic APIs. This allows Cerby to create points for programmatic control even if the application does not expose them. Cerby uses multiple automation agents (browser plug-in, local desktop client, server-side isolated browser), to replay programmed automation flows. This allows Cerby to securely manage and automate security hygiene tasks for any application, without being restricted by the platform's APIs. Cerby can review new applications that are registered by users to see who is using them, how, and with what data. Secure it automatically
  • 45
    Netwrix GroupID Reviews
    The user accounts and group in your Active Directory (formerly Azure AD), and Microsoft Entra ID, provide access to sensitive data and systems. But managing groups and users manually can be a major drain on your IT resources, and it often leads to mistakes that lead to security vulnerabilities. Netwrix GroupID automates group and user management, allowing you to maintain your directories and increase IT productivity. Create queries to dynamically determine group membership by analyzing the attributes of users. As well, any attribute changes to a parent groups are automatically reflected in the child groups. By synchronizing data from a reliable source, such as your HRIS system, you can automatically provision and deprovision accounts. Sync changes across identity stores and groups in near-real time, without a third-party connector.
  • 46
    gPanel Reviews

    gPanel

    Promevo

    $4 per user/ annually
    Administrators have visibility and control over all user data and settings through gPanel's central user management interface. It offers security features that provide peace of mind and security. gPanel's intuitive interface makes it easy to use. This means you can spend less time looking and more time doing. Our advanced administration makes it easy to add, delete, suspend, and de-provision users. Just a click away, you can easily control docs, groups and sites, as well as email settings. Google Workspace does not provide much administrative power for documents within Google Drive. However, gPanel gives admins full text searching and text rights over any document in Drive owned or created by users in their domain. It also allows them to transfer ownership of Google Docs. Administrators have the ability to manage their domain with confidence using gPanel. Admins can save time with gPanel by automating repetitive, monotonous processes.
  • 47
    Access Auditor Reviews
    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 48
    ActivMan Reviews

    ActivMan

    ANB Software Ltd

    £120 per year
    ActivMan adds a number of useful features to Microsoft's Active Directory Users MMC Snapin. Mass manipulation, templates, import of users, and extraction using directly from your MIS. SIMS, while also improving the efficiency in managing users. ActivMan is an out-of-the-box Active Directory user manager designed to be easy-to-use and to drastically improve the process of creating new user accounts, home directories, and shares of new students and staff, whilst also disabling/moving/deleting (optionally) students and staff who have left. It contains all the features that an organisation needs to improve the management of user accounts. ActivMan will synchronise the Active Directory network with your MIS. ActivMan, a user manager solution that is constantly updated with new features and customer requests, is the best choice.
  • 49
    ConductorOne Reviews
    ConductorOne, a cloud-loving identity security platform, is user-friendly and easy to use. It makes access requests, access reviews and deprovisioning quick, secure, compliant, and easy. Cloud apps and infrastructure are great for productivity and collaboration. However, security and GRC teams find managing SaaS permissions and identities difficult and risky. This leads to painful audits, over-permissioned users, as well as increased risk of breaches. ConductorOne's identity platform offers seamless automation, a rich bench of integrations and a best-in-class experience to help manage the entire lifecycle of cloud access permissions and access. No more spreadsheets. No more manually extracting data from apps. No more manually pulling data from apps. Automate access reviews quickly and easily
  • 50
    Govern 365 Reviews
    Govern 365 is an app that provides secure virtual data room solutions. Do you want to strike the perfect balance between administrative control and user empowerment? Our governance platform will help you empower your content owners and content consumers. Govern 365 turns your Microsoft 365 (formerly Office 365!) Governance plan into a reality. It helps you strike the right balance between administrative control and user empowerment. Get actionable insights on where your collaboration change consultants and administrators should focus their time to make the most impact. Govern 365 allows you to automate the implementation and management of your content lifecycle management policies. It also makes it possible to enable information and governance in Microsoft 365. Our governance platform will help your content owners, content consumers, and admins achieve more. Schedule a demo today!