Best PeoplePlatform Alternatives in 2024

Find the top alternatives to PeoplePlatform currently available. Compare ratings, reviews, pricing, and features of PeoplePlatform alternatives in 2024. Slashdot lists the best PeoplePlatform alternatives on the market that offer competing products that are similar to PeoplePlatform. Sort through PeoplePlatform alternatives below to make the best choice for your needs

  • 1
    Cisco Duo Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 2
    ManageEngine ADManager Plus Reviews
    See Software
    Learn More
    Compare Both
    ADManager Plus is an easy-to use Windows Active Directory (AD), management and reporting solution that aids AD administrators and help desk personnel in their day to day activities. The software has a web-based GUI that is intuitive and central. It handles complex tasks such as bulk management of user accounts, other AD objects, and delegate role-based access for help desk technicians. It also generates a comprehensive list of AD reports, which are essential to satisfy compliance audits. The Active Directory tool also includes mobile AD apps that enable AD technicians and administrators to perform user management tasks on the go, right from their mobile devices.
  • 3
    Uniqkey Reviews
    See Software
    Learn More
    Compare Both
    Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.
  • 4
    Frontegg Reviews
    Top Pick
    Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
  • 5
    Securden Unified PAM Reviews
    Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards.
  • 6
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 7
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 8
    JumpCloud Reviews
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 9
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 10
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 11
    Jamf Connect Reviews
    Organizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements.
  • 12
    Deep Identity Reviews
    Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc
  • 13
    IDSync Reviews
    Active Directory to Active Directory Identity Synchronizer Software. Solves Password Sharing Problems, Overly Broad "rights" for IT staff and supports user enablement/disablement for Customer's Active Directory. The Identity Syncronizer Active Directory-to Active Directory platform allows an MSP to connect its On-Premise Active Directory to customers' Active Directory for the purpose of provisioning and synchronizing user metadata as well as passwords for its technicians who will be accessing customers' Active Directory and networks. IDSync is an interface that allows the MSP to identify technicians and identify target Active Directory addresses into which they will be provisioned. Provisioning and synchronization can either be done at the user level or in bulk via security group.
  • 14
    Netwrix GroupID Reviews
    The user accounts and group in your Active Directory (formerly Azure AD), and Microsoft Entra ID, provide access to sensitive data and systems. But managing groups and users manually can be a major drain on your IT resources, and it often leads to mistakes that lead to security vulnerabilities. Netwrix GroupID automates group and user management, allowing you to maintain your directories and increase IT productivity. Create queries to dynamically determine group membership by analyzing the attributes of users. As well, any attribute changes to a parent groups are automatically reflected in the child groups. By synchronizing data from a reliable source, such as your HRIS system, you can automatically provision and deprovision accounts. Sync changes across identity stores and groups in near-real time, without a third-party connector.
  • 15
    ManageEngine M365 Manager Plus Reviews
    M365 Manager Plus is a comprehensive Microsoft 365 tool that can be used to report, manage, monitor, audit, and create alerts for critical activities. It is easy to manage Microsoft 365 services such as Exchange Online, OneDrive for Business and Skype for Business from one place. M365 Manager Plus offers extensive pre-configured reports on Microsoft 365. It helps you perform complex tasks such as bulk user management, bulk mail management, secure delegation, and bulk mailbox management. You can monitor Microsoft 365 services 24/7 and receive email notifications about service interruptions. M365 Manager Plus simplifies compliance management with built in compliance reports. It also offers advanced auditing, alerting, and reporting features to help keep your Microsoft 365 setup safe.
  • 16
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business.
  • 17
    LogonBox Reviews
    Find the LogonBox Advantage and our innovative solutions for modern Enterprises. LogonBox is an independent software vendor. It develops software that helps organizations manage and protect user identities and credentials. LogonBox solutions can reduce helpdesk calls, increase productivity, secure access across heterogeneous enterprise environments, and protect network resources through the extension of authentication beyond the password.
  • 18
    Fischer Identity Reviews

    Fischer Identity

    Fischer International Identity

    Fischer helps organizations build a secure, predictable, and effective Global Identity®. Architecture. The number one priority is now to secure an Identity Program. Fischer Identity offers hardware and software solutions, as well as Global Identity®, Services to protect and control information technology resources. Our plug-and-play automation allows for predictable, secure provisioning that will provide your identities with the access they require on day one. You can also deprovision access as needed. Automating Fischer's way will eliminate the need for professional services. Our governance model gives you the control you need in order to ensure compliance throughout your business. You will always know who has what access, how they got it, and what you can do to correct any issues.
  • 19
    Bravura Identity Reviews
    Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access.
  • 20
    RSA SecurID Reviews
    RSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity.
  • 21
    OpenText NetIQ Identity Manager Reviews
    Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority.
  • 22
    BastionPass Reviews

    BastionPass

    BastionWare

    $1.59 per user per month
    BastionPass was created out of necessity to provide a collaborative, all-encompassing platform that can be used by family and coworkers in a way that other password management solutions don't offer. Our goal has been to create a single identity management system and share capabilities using a simple interface. This makes it easy for individuals and teams to manage their passwords. BastionPass will manage your passwords for you so that you don't have to. Our plugin will automatically log you in to all other sites once you have signed in with your master password. You can easily create complex passwords for all of your logins. Keep them safe in our vault, which is triple-encrypted. Access, manage, and share passwords from your desktop or mobile device easily. BastionPass was built from the ground up to meet your digital life requirements.
  • 23
    HORACIUS IAM Reviews
    Management of access rights to systems directly affects the agility of business processes. Choosing an IAM Identity Management platform that ensures security for all applications, data, and access is one of the most important strategic choices that will reduce costs and risk and increase the company's productivity. How can you ensure that your organization has the right levels of access, data, and transactions for all employees? The IAM Identity Management platform can also be integrated with the main Human Resources system, synchronizing information, and performing tasks essential to the smooth running the business. From the initial access at admission to the end of the link, all rights to the system are tracked.
  • 24
    Core Security Access Assurance Suite Reviews
    Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets.
  • 25
    Akku Reviews

    Akku

    CloudNow Technologies

    $5.00/year/user
    Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control.
  • 26
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 27
    Garancy IAM Suite Reviews
    Dynamic companies need the best identity management solution. The increasing dynamic nature and complexity of business operations makes identity management today particularly difficult. The IT landscape is constantly changing and growing in terms of IT systems, applications, and other aspects. Compliance-related concerns are greatly affected by new legal provisions and extensive audits. Users and users change all the time. Modern business is marked by frequent restructuring, acquisitions, and international operations. Companies must be able to manage highly flexible organizations that are able to adapt to all of this change. Solutions that support digital transformation and Industry4.0 are essential to meet business demands. Beta Systems access and identity management solutions offer maximum flexibility for dynamic companies. Integrating governance and provisioning into a single IAM system covers all compliance requirements.
  • 28
    Access Auditor Reviews
    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 29
    Symantec IGA Reviews
    Although user experience and instantaneous access have become the norm, the IT infrastructure supporting these efforts has grown exponentially more complex. IT organizations are under constant pressure to reduce operational costs while still complying with increasing numbers of industry and government regulations. IT organizations must allow more people to access different applications in a shorter time span, while still being accountable to a multitude of parties who control access. Identity governance and administration technologies today must be able provide broad provisioning support for both on-premises as well as cloud apps. They also need entitlements certification to verify that privileges are appropriate. All this while scaling to store millions.
  • 30
    ManageEngine AD360 Reviews
    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
  • 31
    BAAR-IGA Reviews

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications.
  • 32
    CoffeeBean Identity and Access Management Reviews
    CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management.
  • 33
    Hyena Reviews

    Hyena

    SystemTools Software

    $329
    Hyena has been used by thousands of system administrators around the world for over twenty-five (25) years. It is widely known in the industry as one the best Active Directory and Windows management tools available... at any price! It's designed to simplify and centralize almost all of the day-today management tasks while also providing new capabilities for system administration. All of this functionality is available in one, centralized, and easy-to-use product. You can manage all aspects of your organization's Windows 2003, Windows 2019 and other versions with one tool. Hyena, our award-winning Active Directory management software and Windows system management software, now offers multiple ways to mass update Active Directory information. You can use the Active Task feature to mass update and import Active Directory information or the Active Editor, which allows you to freely move around and make changes to directory information.
  • 34
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 35
    RapidScale Identity as a Service Reviews
    RapidScale's Identity as a Service is ideal for organizations that need to make network access simple for staff without compromising security. Our IDaaS solution is built on the backbone Azure Active Directory and provides powerful security right out of the box. No matter where your applications and critical data are located, you can protect them. There are options for single sign-on (SSO), multifactor authentication (MFA), password syncization, and many other features. Our identity services options make it easy to increase your login security. Advanced password sync functions such as user password reset, changing, writeback, and more can be used to control access. Our full-service portal makes it easy to manage IDaaS services, as well as other RapidScale solutions. Alternately let us manage your IDaaS deployment.
  • 36
    passbolt Reviews

    passbolt

    passbolt

    €45/month/10 users
    1 Rating
    Finally, a password manager that is designed for collaboration. Secure, flexible, and ready for automation. Trusted by over 10,000 organizations, including Fortune 500 companies and newspapers as well as governments and military forces. Passbolt servers have been designed to be easy to set up and manage. They are enterprise-ready and can be configured to support high availability. Passbolt is available via your browser or your mobile phone. Real-time sharing is possible. Desktop apps are on the horizon. The JSON API allows you to retrieve, store, and share passwords programmatically. Automate at scale using Passbolt CLI Access logs in real-time. Privacy is part of our DNA, and also in the DNA European laws (to ensure we don't change minds). Passbolt's self-hosted source code is covered by an AGPL license. Yes, even the commercial version. It is free to be audited, contributed to, and redistributed. This is why we have thousands of organizations from all sectors.
  • 37
    OpenIAM Reviews
    Identity Governance and Web Access Management You must ensure that new employees are granted access to all systems and resources necessary to their work. Access that is not necessary for the new position must also be revoked. It is essential that permissions are granted for users who leave the firm or are terminated. To avoid disgruntled users, access to sensitive data and applications must be disabled or removed promptly with traceability.
  • 38
    SAASPASS Reviews

    SAASPASS

    SAASPASS

    $10 per month
    The Only Full-Stack Identity & Management Solution that goes beyond passwords. SAASPASS is your key to the world. Say Goodbye To Passwords Everywhere. Secure Authentication Made Magical. Personal Use Protect yourself. Protect your company admins. Protect your employees. Developers. Protect Your End Users. You can instantly control and manage network access for employees and partners. Eliminate manual password typing and the associated resources for password complexity rules and resets. One, simple-to-use solutions can replace single sign-on products and ID cards. Use out-of-band MFA to secure every access point to your corporate network and personal data. Instantly log in to your Mac or computer with full MFA. Securely and seamlessly authenticate to cloud-based or on-premise applications. Reduce the impact of password and data breaches on your organization. Reduce the risks and costs
  • 39
    Adaxes Reviews

    Adaxes

    Softerra

    $1,600 one-time payment
    Adaxes is a management solution that automates Microsoft 365 environments, Exchange, and Active Directory. Adaxes is a rule-based platform that can be used to automate Microsoft 365, Exchange, and Active Directory. It also provides a web-based management environment. You can use a role-based access control model to delegate privileges, adds security and workflow approvals, and allows you enforce corporate data standards. Adaxes automates all aspects of user lifecycle management, including provisioning, reprovisioning, and deprovisioning in Active Directory, Microsoft 365, and Skype for Business.
  • 40
    Aquera Reviews
    The Aquera Identity Integration Platform as a service is a cloud-based platform that provides SCIM gateway services to account provisioning and aggregation. It also offers orchestration services for password synchronization and user orchestration. Workflow services for the governance and management of disconnected applications. It also offers password rotation gateway services for privileged accounts management. There are also a wide range of connectors available for cloud and on-premises applications. Built-on-demand connectors that are out-of-the box and ready-to-use can be used to connect to any cloud or onpremises application, directory, device or portal, as well as HR applications. The identity integrations are quick and easy to deploy. The platform features multi-purpose gateway services and out-of-the-box connectors for user provisioning/deprovisioning, HR application user onboarding/mastering, delta account aggregation, file operations, etc.
  • 41
    Vault One Reviews

    Vault One

    VaultOne Software

    $99 per month
    You have complete control over who has access to your data, systems and infrastructure. This will prevent cyber attacks and data breaches. VaultOne helps you to protect your company's assets and ensure compliance. VaultOne is reinventing the concept behind privileged access management (PAM). VaultOne is reinventing the concept of privileged access management (PAM). It allows you to manage user access, credentials, and sessions in a fast and secure way. We offer multiple features such as a digital vault, password generator and sessions recording, auditing, reporting, customizable policies and disaster recovery. You've found the right solution to protect shared accounts, certificates, and user access to websites, applications, servers, databases and cloud services. You can prevent data breaches by creating custom access policies and managing privileges.
  • 42
    IAMCompare Reviews

    IAMCompare

    IAMCompare

    $500 per month
    IAMCompare is the only solution that focuses on auditing the integrity and de-provisioning of your Provisioning and De-provisioning processes. We track user access exceptions, identify them and resolve them, which reduces both time and costs. IAMCompare provides companies with direct visibility into their accounts. Our solution delivers results at a transparent cost. Our clients then identify assets (applications databases, devices, and other) that need monitoring and provide relevant account data. IAMCompare combines account and census information to identify actionable anomalies. You can view account access for employees, authorized contractors, vendors, and customers. Use IAMCompare for system access reviews and standardization of vendor, customer, and other third-party user certifications.
  • 43
    Vyapin Microsoft 365 Manager Reviews
    Vyapin Microsoft 365 Manager provides a single-stop O365 solution. It manages Users, Groups Licenses Permissions & More. The software automates Office 365 License Management, User provisioning, deprovisioning in bulk, administration, security groups, distribution groups, mailbox permissions management, and user provisioning and deprovisioning. You can manage Office 365 from your desktop with just a few clicks. This ensures that Office 365's security and health are never compromised. The native Office 365 Management portal is not able to automate large-scale administrative tasks. Administrators must perform a series tasks to enable users to start working immediately after they are provisioned.
  • 44
    MonoSign Reviews
    MonoSign is a complete Identity & Access Management Solution for Enterprise Level Companies. Get Universal Directory, Single-Sign-On, Adaptive Multi-Factor Authentication, Lifecycle Management, and many other features. MonoFor is here today with MonoSign, one of the most powerful and easy-to-deploy Identity & Access Management Software for enterprise-level companies.
  • 45
    ConductorOne Reviews
    ConductorOne, a cloud-loving identity security platform, is user-friendly and easy to use. It makes access requests, access reviews and deprovisioning quick, secure, compliant, and easy. Cloud apps and infrastructure are great for productivity and collaboration. However, security and GRC teams find managing SaaS permissions and identities difficult and risky. This leads to painful audits, over-permissioned users, as well as increased risk of breaches. ConductorOne's identity platform offers seamless automation, a rich bench of integrations and a best-in-class experience to help manage the entire lifecycle of cloud access permissions and access. No more spreadsheets. No more manually extracting data from apps. No more manually pulling data from apps. Automate access reviews quickly and easily
  • 46
    RapidIdentity Reviews
    Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs.
  • 47
    Tools4ever IAM Reviews
    Streamline your operations and ensure compliance with HIPPA, SOX, or other requirements. IAM allows for user provisioning, central account management, and role-based access control through the integration of personnel and directory systems. Automated onboarding/offboarding ensures that the right people have access at the right times. You can learn more about how IAM works in your environment. It is a full-time job to manually create, manage, or disable user accounts in today’s complex corporate environment. Tools4ever's IAM user provisioning software connects HR systems, directory services (e.g. Active Directory, LDAP and GSuite) and downstream services. The entire process can be automated, allowing IT staff to recover significant bandwidth.
  • 48
    Clear Skye IGA Reviews
    Organizations need to understand and manage who has access to what across their entire IT ecosystem: cloud and on-premises application stack, infrastructure, DevOps pipelines. This is important for both external (regulatory compliance) and internal (security and risk management, employee experience and productivity) reasons. Legacy identity solutions have not met the needs of modern organizations with over 50% of Identity Governance programs being in distress and more than 75% looking to replace their current solution (Source: Gartner). They are unable to keep pace with shifts in business due to digital transformation and the rise of the business platform. Clear Skye, the only identity governance and security solution built natively on ServiceNow, optimizes enterprise identity and risk management with a platform-first approach. The company provides workflow management, access requests, access review, and identity lifecycle management tools to a broad set of vertical markets. By leveraging an existing ​business platform, Clear Skye enables customers to ​reduce friction and IT hurdles, while improving workflows and user experience.
  • 49
    CionSystems Reviews
    Access to a privileged account is responsible for 74% of all breaches. Security gaps and risks have increased due to mass migration to remote workforce enterprise operations. Enterprise identity manager is a "out of the box" solution that dramatically simplifies, simplifies, and secures enterprise Active Directory deployments. It does not require any scripts or code. EIM allows rapid transition of Active Directory to manage large remote workforces. It provides real-time tracking and notifications of all changes. Active Directory is used by more than 90% of businesses worldwide. Complex cloud migration and synchronization can lead to security gaps. Cloud Office 365 simplifies the tedious task of managing Internet user accounts. It dramatically reduces the time needed to provision and de-provision users, provides real-time tracking and significantly reduces unused and untracked licensing costs.
  • 50
    CzechIDM Reviews
    The IT department is often overwhelmed with routine requests relating to account management, such as manual account creation, password reset, auditing work, long inactive accounts. There is often no accounting of who has access and where. Our customers can automate their routine processes, centralize data systems, delegate account management and keep transparent evidence of permissions granted. Identity Management (IdM), is about centralizing access and identity management within IT systems. It allows the right people to access the right data sources at the right time and for the right reasons. And, most importantly, it has reliable evidencing records. We assist companies in improving Identity and Access Management. Our goal is to make companies more efficient and safer by simplifying user management across company systems.