Best Quest Active Administrator Alternatives in 2025
Find the top alternatives to Quest Active Administrator currently available. Compare ratings, reviews, pricing, and features of Quest Active Administrator alternatives in 2025. Slashdot lists the best Quest Active Administrator alternatives on the market that offer competing products that are similar to Quest Active Administrator. Sort through Quest Active Administrator alternatives below to make the best choice for your needs
-
1
ManageEngine ADManager Plus
ManageEngine
475 RatingsADManager Plus is an easy-to use Windows Active Directory (AD), management and reporting solution that aids AD administrators and help desk personnel in their day to day activities. The software has a web-based GUI that is intuitive and central. It handles complex tasks such as bulk management of user accounts, other AD objects, and delegate role-based access for help desk technicians. It also generates a comprehensive list of AD reports, which are essential to satisfy compliance audits. The Active Directory tool also includes mobile AD apps that enable AD technicians and administrators to perform user management tasks on the go, right from their mobile devices. -
2
Uniqkey
Uniqkey
175 RatingsUniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind. -
3
JumpCloud
JumpCloud
3,325 RatingsSmall and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free. -
4
CoreSuite
CoreView
All the best Microsoft 365 (formerly Office 365) management tools in one platform. CoreSuite gives you everything you need to automate, delegate, secure, and improve your company's productivity using Microsoft 365 (M365). M365 admin tasks can be distributed across multiple geographies and thousands of employees in enterprises. CoreSuite's single platform design makes it easy for admin tasks to be delegated, alerts to be automated and adoption facilitated. CoreSuite provides a single dashboard that allows users to seamlessly switch between tasks such as calculating chargebacks, preempting data breaches, onboarding new employees, and tracking long-term product adoption. -
5
SolarWinds Access Rights Manager
SolarWinds
1 RatingSolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation. -
6
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
7
SecurEnds
SecurEnds
SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations. -
8
Employees can access the services and applications they need without exposing their data or processes to unauthorized users. Governance software automates user provisioning, and certifies access to on-premise data and applications. This streamlines the process of validating and managing user access. You can also enforce governance through preventative policy checks and monitoring for emergency access. You can automatically identify and correct access risk violations across SAP and third party systems. Integrate compliance checks and mandatory risk mitigation in business processes. Allow users to submit workflow-driven, self-service access requests and approvals. With embedded risk analysis, identify and correct violations of segregation and critical access. Automate user access assignments across SAP systems and third-party applications. Maintain compliance roles using business-friendly terminology and terms.
-
9
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
10
GPOADmin
Quest
Simplify Active Directory group policy and governance management. GPOADmin, a third-party solution for group policy management and governance, allows you to search and administer, verify, compare and update GPOs. This will ensure consistency and prevent long-term GPO proliferation. GPO comparison features, enhanced security and workflow capabilities, allow you to control and secure your Windows infrastructure while supporting governance efforts. GPOs are critical. Even though it may seem innocuous, one wrong GPO can have a huge impact on the security of thousands of systems within your network. GPOADmin automates critical Group Policy management tasks and governance tasks, reducing risk and eliminating manual processes. GPO auditing can be improved and verified consistency quickly and easily using advanced, side-by sides GPO version comparisons at different intervals. -
11
AWS Directory Service
Amazon
$0.018AWS Directory Service to Microsoft Active Directory, also known AWS Managed Microsoft Active Directory (AD), allows you to use managed Active Directory in AWS with your directory-aware workloads. AWS Managed Microsoft AD is based on Microsoft Active Directory and does not require that you synchronize or replicate your data to the cloud. You can use the standard AD administration tools, and you can take advantage of the built in AD features such as Group Policy or single sign-on. AWS Managed Microsoft AD allows you to join Amazon EC2 or Amazon RDS for SQL Server instances in your domain and use AWS End User Computing services (EUC), such as Amazon WorkSpaces with AD users and groups. AWS Managed Microsoft AD makes it simple to migrate AD-dependent Windows workloads to AWS. AWS Managed Microsoft AD allows you to use Group Policies to manage EC2 instances, and run AD-dependent apps in the AWS Cloud. -
12
Zoho Directory
Zoho
$1.70/user/ month Zoho Directory, a cloud-based platform for identity and access management, is designed to streamline authentication and authorization. It also simplifies user management. Single Sign-On (SSO), which allows employees to access multiple apps with a single set credentials, enhances security and user convenience. Multi-Factor Authentication is supported by the platform, adding an additional layer of protection from unauthorized access. Device authentication provides secure access to applications and devices. Employees can use the same credentials on all platforms. Zoho Directory offers robust provisioning capabilities, which allow IT administrators to create user profiles for various applications from the platform. This reduces the time spent on repetitive work. Directory stores facilitate integration with existing directories such as Microsoft Active Directory or Azure AD. -
13
Nuvolex
Nuvolex
Nuvolex allows IT Organizations to streamline their daily administration across all Azure and M365 workloads by leveraging extensive workflow automation. IT Organizations can manage all their users, tenants, licenses, and Microsoft Cloud Services via the ManageX™,Single Pane Of Glass administration portal. In just a few clicks, you can push multiple M365 configuration changes or policies to any number tenants. To ensure consistency and compliance for all tenants managed by your team, save M365 service configurations. Get valuable insight into the data of all your Tenants to increase security and lower TCO for your Cloud Services. A single report is all you need to get a comprehensive view of your tenants usage, licensing and metrics. -
14
Vyapin Microsoft 365 Manager
Vyapin Software Systems
Vyapin Microsoft 365 Manager provides a single-stop O365 solution. It manages Users, Groups Licenses Permissions & More. The software automates Office 365 License Management, User provisioning, deprovisioning in bulk, administration, security groups, distribution groups, mailbox permissions management, and user provisioning and deprovisioning. You can manage Office 365 from your desktop with just a few clicks. This ensures that Office 365's security and health are never compromised. The native Office 365 Management portal is not able to automate large-scale administrative tasks. Administrators must perform a series tasks to enable users to start working immediately after they are provisioned. -
15
Heimdal Application Control
Heimdal®
Heimdal Application Control offers a new approach to integrative app management and user rights curation. App Control is modular and easy to set-up. It allows the system administrator to create all encompassing rule-based frameworks and streamline auto-dismissal and auto-approval flows. It also enforces individual rights per Active Directory group. The uniqueness of the tool comes from its ability, in perfect coordination with a (PAM), Privileged Access Management solution. This allows for the user to have granular oversight over software inventories and hardware assets. -
16
ManageEngine M365 Manager Plus
Zoho
$345 per yearM365 Manager Plus is a comprehensive Microsoft 365 tool that can be used to report, manage, monitor, audit, and create alerts for critical activities. It is easy to manage Microsoft 365 services such as Exchange Online, OneDrive for Business and Skype for Business from one place. M365 Manager Plus offers extensive pre-configured reports on Microsoft 365. It helps you perform complex tasks such as bulk user management, bulk mail management, secure delegation, and bulk mailbox management. You can monitor Microsoft 365 services 24/7 and receive email notifications about service interruptions. M365 Manager Plus simplifies compliance management with built in compliance reports. It also offers advanced auditing, alerting, and reporting features to help keep your Microsoft 365 setup safe. -
17
ActivMan
ANB Software Ltd
£120 per yearActivMan adds a number of useful features to Microsoft's Active Directory Users MMC Snapin. Mass manipulation, templates, import of users, and extraction using directly from your MIS. SIMS, while also improving the efficiency in managing users. ActivMan is an out-of-the-box Active Directory user manager designed to be easy-to-use and to drastically improve the process of creating new user accounts, home directories, and shares of new students and staff, whilst also disabling/moving/deleting (optionally) students and staff who have left. It contains all the features that an organisation needs to improve the management of user accounts. ActivMan will synchronise the Active Directory network with your MIS. ActivMan, a user manager solution that is constantly updated with new features and customer requests, is the best choice. -
18
LoginTC
Cyphercor
$3/month/ user Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease. -
19
my-IAM TeamSpace
FirstAttribute AG
My-IAM TeamSpace allows you to create a compliance-oriented approach to working with Microsoft Teams. IT admins as well as users can use my-IAM TeamSpace to manage and manage teams. M365 admins create security settings for teams. They categorize them and map them into templates. In advance, the roles, permissions, data security, and granular customizations of each team member are set. The great advantage is that employees take over the controlled and controlled administration of teams. -
20
Core Security Access Assurance Suite
Core Security (Fortra)
Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets. -
21
Netwrix GroupID
Netwrix
The user accounts and group in your Active Directory (formerly Azure AD), and Microsoft Entra ID, provide access to sensitive data and systems. But managing groups and users manually can be a major drain on your IT resources, and it often leads to mistakes that lead to security vulnerabilities. Netwrix GroupID automates group and user management, allowing you to maintain your directories and increase IT productivity. Create queries to dynamically determine group membership by analyzing the attributes of users. As well, any attribute changes to a parent groups are automatically reflected in the child groups. By synchronizing data from a reliable source, such as your HRIS system, you can automatically provision and deprovision accounts. Sync changes across identity stores and groups in near-real time, without a third-party connector. -
22
SysTools Active Directory Management
SysTools
$499Active directory management tool allows you to edit, remove, and create bulk users in AD. Batch migration of users to a new domain active directory. You can view, manage, and preview active directory user accounts right from your computer. You can rollback changes to active directory. From the software home screen, create multiple users in active directories. Allows you to move user accounts from one OU to another OU. It allows you to search, delete, modify, rename, or create an organizational unit in AD. Password and username for Active Directory Admin are required. MS Exchange Server must be active and available on the user's machine. The administrator of AD Console can perform multiple tasks from one panel. You can perform multiple operations, such as creating a new user or an organizational unit, deleting user, changing user attributes, moving AD user to another OU and undoing all changes using rollback options. -
23
Hyena
SystemTools Software
$329Hyena has been used by thousands of system administrators around the world for over twenty-five (25) years. It is widely known in the industry as one the best Active Directory and Windows management tools available... at any price! It's designed to simplify and centralize almost all of the day-today management tasks while also providing new capabilities for system administration. All of this functionality is available in one, centralized, and easy-to-use product. You can manage all aspects of your organization's Windows 2003, Windows 2019 and other versions with one tool. Hyena, our award-winning Active Directory management software and Windows system management software, now offers multiple ways to mass update Active Directory information. You can use the Active Task feature to mass update and import Active Directory information or the Active Editor, which allows you to freely move around and make changes to directory information. -
24
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
25
DynamicGroup
FirstAttribute
FirstWare DynamicGroup can automate group memberships for AD objects. It speeds up processes and reduces workload for IT-departments. It allows for real-time savings and better security thanks to group memberships that are always up-to date. It's easy to organize groups in Active Directory. With DynamicGroup IT-administrators, group memberships can be arranged in just seconds. -
26
Juniper Identity Management Service
Juniper Networks
Access to corporate data should be a top priority. Access to corporate data can be abused by insiders who have direct access. User access must be controlled and enforced across all levels of the organization, including mobile and cloud, to ensure the safety of corporate resources. Juniper Identity Management Service improves enterprise security by authenticating and restricting user access. It is the first line of defense for protecting corporate assets and preventing corporate breaches. Employees are identified and assigned corporate roles which determine what data and applications they can access. Juniper Identity Management Service seamlessly integrates to SRX Series next generation firewalls. This allows security teams to match user roles and application activity to security policies. It can then generate detailed user-metrics as well as audit reports for detailed reporting. -
27
Govern 365
Netwoven
$149Govern 365 is an app that provides secure virtual data room solutions. Do you want to strike the perfect balance between administrative control and user empowerment? Our governance platform will help you empower your content owners and content consumers. Govern 365 turns your Microsoft 365 (formerly Office 365!) Governance plan into a reality. It helps you strike the right balance between administrative control and user empowerment. Get actionable insights on where your collaboration change consultants and administrators should focus their time to make the most impact. Govern 365 allows you to automate the implementation and management of your content lifecycle management policies. It also makes it possible to enable information and governance in Microsoft 365. Our governance platform will help your content owners, content consumers, and admins achieve more. Schedule a demo today! -
28
Bravura Identity
Bravura Security
Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access. -
29
ConductorOne
ConductorOne
ConductorOne, a cloud-loving identity security platform, is user-friendly and easy to use. It makes access requests, access reviews and deprovisioning quick, secure, compliant, and easy. Cloud apps and infrastructure are great for productivity and collaboration. However, security and GRC teams find managing SaaS permissions and identities difficult and risky. This leads to painful audits, over-permissioned users, as well as increased risk of breaches. ConductorOne's identity platform offers seamless automation, a rich bench of integrations and a best-in-class experience to help manage the entire lifecycle of cloud access permissions and access. No more spreadsheets. No more manually extracting data from apps. No more manually pulling data from apps. Automate access reviews quickly and easily -
30
Tuebora
Tuebora
Natural language user interface eliminates UI adoption risks. In just a few weeks, you can complete deployment. Only the microservices that you need can be added or removed. Connectors that are SCIM compliant and easy to build. Create new IAM processes that are tailored to your company. Machine learning identifies and corrects errors. Your "Cloud-first strategy" will be supported. Built for the cloud to manage identity everywhere. Smart Businesses rely on Tuebora's platform for identity solutions to increase business value and reduce risk. Our Natural Language User Interface allows you to communicate hundreds IAM scenarios to business applications. Your IAM processes will be natural, fast, and agile. Machine learning is used to identify unused account access and provisioning actions that were not performed in accordance with established processes. Cloud applications are rapidly adopting and require management of identity. Traditional vendor solutions are not able to support cloud identity requirements. -
31
Abbey
Abbey Labs
$20 per user per monthAbbey streamlines data accessibility and allows engineers to focus on their core responsibilities without compromising security or compliance. Build and enforce compliance rules without causing friction to engineering teams. Our intuitive web app allows you to discover, request and manage resources. Abbey or Git version control systems can be used to log and audit changes in access rights for compliance. Build a secure and compliant infrastructure while empowering your team. Abbey can help you improve your security and compliance program by automatically controlling and sizing permissions. This will limit the risk of unauthorized access in the event of an incident. Abbey automates access management, allowing it to work with your existing infrastructure. Abbey works with your infrastructure to provide access. Your employees use the resources and Abbey revokes access when they are done. -
32
Security Weaver
Security Weaver
Software license audits are becoming more frequent. Enterprises must ensure that software license allocations comply to avoid unbudgeted licensing fees at audit time. Our License Management module offers compliant SAP license management automation, integrated with automated user provisioning. This allows your organization to optimize SAP and other complex licences. -
33
Lurel, a platform for data governance and access control management, is designed to help companies gain control over internal data. It has features like centralized access control and real-time monitoring. It also offers automated compliance and risk assessment tools. Lurel's unified platform integrates all identity providers, allowing for precise access control. The platform allows companies to detect and prevent risks among employees, while ensuring data security as well as compliance with industry standards.
-
34
Amazon Verified Permissions
Amazon
$0.00015 per requestAmazon Verified Permissions, a fully-managed authorization service, uses the Cedar policy language that is proven to be correct. This allows you to build more secure applications. Verified Permissions allows developers to build applications faster through the centralization of policy management and externalization of authorization. They can also align authorization in the application with Zero trust principles. Teams from security and audit can better audit and analyze who has access to which applications. Decouple authorization from business logic to accelerate application development. Protect application resources, and manage user access according to the principle of least priviledge. Amazon Verified Permissions provides a managed permissions management service that is Cedar-compatible. It also allows you to fine-grained authorize your applications. Cedar is an expressive, performant and analyzable policy language that allows developers and administrators to define policy-based controls. -
35
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications. -
36
LogMeOnce
LogMeOnce
$3 per user per monthAn effective cyber security defense must be able to stop both internal and external threats. One common factor unites external and internal threats. The end user's compliance with security, policy, best practices. External elements can exploit an unacquainting internal user's compliance to sound security policies to gain entry. Although external threats can be dealt with using various mechanisms, such as firewalls and other security tools, it is inherently rooted in internal weaknesses. You can reduce internal threats by simply creating "automatic and enforceable" security policies. This will require end-users adhere to secure access protocols using trusted credentials. LogMeOnce Patented technology offers many ways to protect your agency, team members, and credentials with advanced automated authentication. LogmeOnce dashboard gives users powerful and unified access across all their applications. -
37
Permit.io
Permit.io
Full Stack Permissions is a service. Check authorization as completed, focus on core product. Use the right tool for your task. Use the right language to describe the right policy. Say no to lock-in. Mix and match policy engines to meet your needs. Permit.io now supports AWS' Cedar and Amazon Verified Permissions, as well as OPA's Rego. Generate policy as code directly in Git and deploy in realtime to the agent in your application. Permissions are granted as easily as checking a checkbox. Manage and edit policies in seconds, not days. You can use a simple UI or API to work with Rego code. Multi-tenancy, RBAC and ReBAC can be enabled with a single interface. Low-code/no code interfaces are available for non-technical end users. Assure future requirements will be met by using policy as code. Get Git Ops support out-of-the-box. -
38
Rippling streamlines HR, payroll, IT, and spend management for global businesses. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration to performance. Automate HR tasks, simplify approvals, and ensure compliance. Manage devices, software access, and compliance monitoring all from one dashboard. Enjoy timely payroll, expense management, and dynamic financial policies, empowering you to save time, reduce costs, and enhance efficiency in your business. Experience the power of unified management with Rippling today.
-
39
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
40
Authomize
Authomize
Authomize continuously detects any effective relationships between human and machine identities to company resources throughout all your organization's environments. (IaaS. PaaS. SaaS. Data. On-prem). This includes the most detailed company asset, and it is normalized consistently across all apps. Authomize keeps you informed about your identities, assets, and access policies. It can block unintended access by using guardrails, alerts on anomalies, and alerts on other risks. Authomize's AI engine harnesses its detailed and granular view of all environments in an organization to create the best access policies for any relationship between identity and asset. SmartGroup technology performs continuous access modelling, self-correcting because it incorporates new inputs like actual usage, activities, and decisions to create an optimal permission structure. -
41
RapidIdentity
Identity Automation
Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs. -
42
Syskit Point
Syskit
Your end-users should be empowered to participate in Office 365 governance. To reduce tenant clutter, ask your Microsoft Teams, Microsoft 365 Groups and site owners to manage inactive resources regularly. Regular access reviews should be scheduled for resource owners to ensure that the right people have access. A central web interface gives you a complete overview of your Office 365 environment, including ownership and rights across Microsoft Teams, SharePoint Online and Microsoft 365 Groups. Easy-to-read security reports can be created and used to proactively manage access and users. Coripharma is in a highlyregulated industry and needed a central point to track who has access to what. SysKit Point has allowed Coripharma to save half the work they used and provide a quick central point for access management and overview that helps them comply with all laws and regulations. -
43
DoControl allows administrators, employees, and external users to set fine-grained policies that control how data is accessed, shared, and modified in SaaS apps. Complex SaaS apps, users, admins, and their interactions create a lot of user interactions and an attack surface that is difficult to follow. DoControl gives you continuous visibility to data exposures across multiple SaaS applications. Different SaaS apps have different security features making it difficult to enforce security policies across all of them. DoControl's Data Access Controls are a new way to prevent threats at scale. Security teams must ingest logs from multiple applications, organize the metadata, identify anomalies, and take action to protect against unanticipated or unusual activity. DoControl automates everything right out of the box.
-
44
Jamf Connect
Jamf
$2 per user per month 1 RatingOrganizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements. -
45
Visual Identity Suite
Core Security (Fortra)
Visual Identity Suite (VIS), previously offered by Courion as part of its Core Security Identity Governance and Administration portfolio, empowers organizations to view user privileges and access certificates in a new way. It uses an intelligent, visual-first approach. You can quickly identify outliers and see common user entitlements using an intuitive graphical interface. This allows you to quickly identify the right people to access what information. VIS allows you to see what access looks like within your business so that you can manage identity chaos and mitigate identity risk. Intelligent and visible identity governance across all your environments is essential for reducing identity risk within your organization. To simplify your identity governance and administration, you should use a visual-first approach to the creation and management access reviews and roles. -
46
Entitle
BeyondTrust
Entitle blends a security-first approach in provisioning and governance with a commitment for business enablement for all employees, from R&D and Sales to H&R to finance. To speed up provisioning, security policies can be automatically updated to reflect changes in infrastructure and employee requirements. Permissions can be granted to specific resources such as Google Drive folders and database tables, Git repositories, or other resources. Protect privileged roles and resources by only granting access when necessary, and removing them when they are not. For authorizations you can trust, give access requests to peers, managers, resource owners, and managers. DevOps and IT can save significant time and resources by using automated access requests and zero touch provisioning. For a seamless approval process, users can request access via Slack or Teams, Jira or email. To keep up with organizational changes, grant bulk permissions to speed onboarding and offboarding. -
47
Oracle Identity Management
Oracle
Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform. -
48
Sysgem Enterprise Manager
Sysgem
$200 per user per monthFlexible and modular tools that monitor and manage systems, administer user accounts, and audit security from one screen - Windows, UNIX/Linux and OpenVMS - are available. SEM provides the three core modules Sysgem System Manager, Sysgem Account Manager and Sysgem Fil Synchronizer (SFiS), which all run on the SEM framework. Unify, simplify, and integrate core system administration solutions across a multiplatform environment. Unify user account management across a multi-platform, multi-application environment. Control the distribution and deployment of configuration files across infrastructure. -
49
RapidScale Identity as a Service
RapidScale
RapidScale's Identity as a Service is ideal for organizations that need to make network access simple for staff without compromising security. Our IDaaS solution is built on the backbone Azure Active Directory and provides powerful security right out of the box. No matter where your applications and critical data are located, you can protect them. There are options for single sign-on (SSO), multifactor authentication (MFA), password syncization, and many other features. Our identity services options make it easy to increase your login security. Advanced password sync functions such as user password reset, changing, writeback, and more can be used to control access. Our full-service portal makes it easy to manage IDaaS services, as well as other RapidScale solutions. Alternately let us manage your IDaaS deployment. -
50
One Identity
Quest Software
Enterprise identity and access management can be simplified. You can reduce risk, secure data and comply with compliance by allowing your users access only to the data and applications they require. Identity and access management (IAM), can now be driven by business requirements, not IT capabilities. Identity Manager allows you to unify information security policies, and meet governance requirements -- both today and in the future.