Alternatives to LDAP Admin Tool

Compare LDAP Admin Tool alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to LDAP Admin Tool in 2026. Compare features, ratings, user reviews, pricing, and more from LDAP Admin Tool competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cerberus FTP Server

    Cerberus FTP Server

    Redwood Software

    Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations. - FTP/S, SCP, SFTP, HTTPS - SAML SSO - Active Directory & LDAP - Secure SSL Encryption - Two-Factor Authentication - IP Auto-Banning and Geoblocking - HIPAA Compliant - FIPS 140-2 Validated - Advanced Reporting - Comprehensive Auditing - Web File Transfer Client - Email Notifications - Event Support & Automation - File Retention Policies -Unlimited Connections -Virtual Directories -Users & Groups -Detailed Logs -Full IPv6 Support -FTP with TLS/SSL -SOAP control API -Web Administration -SSH2 SFTP and SCP -Public Key Authentication
    Compare vs. LDAP Admin Tool View Software
    Visit Website
  • 2
    Foxpass

    Foxpass

    Foxpass

    Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.
  • 3
    Symantec SiteMinder
    Regardless of how a user accesses an application, the first step is the access management process is authentication, which enables the user to properly identify themselves. Therefore, the first critical capability of a modern access management technology is to be able to support any and all methods of authentication, and more importantly, be capable manage when each one is used to challenge a user. Once authenticated, the next critical capability is to manage and protect the user’s session. This capability unifies the user experience across multiple applications while simultaneously delivering single sign-on, but also ensuring that the user’s session is protected against hijacking. Additionally, as the user requests access to applications, the access management technology must be capable of performing authorization checks to determine whether the user should be granted access. A modern access management technology delivers these capabilities.
  • 4
    LDAP Plus AD Help Desk Professional Tool
    LDAP Plus AD Help Desk Professional Tool is a powerful Active Directory & LDAP administration, reporting and help desk solution. This is a professional tool to manage accounts, assign permissions to users, lock/unlock users accounts and manage other network directory systems. This tool provides both LDAP and Active Directory reports that assist in both compliance (SOX, HIPAA) and management reporting.This tool provides help desk personals and administrators with an interface for single point of administration to manage both Active Directory and LDAP. LDAP Plus AD Help Desk Professional Tool provides a very simple windows like interface to generate both AD and LDAP reports which you can print or export to various formats (Excel, csv and LDIF). It also provides a very simple and easy wizard to schedule reports using windows scheduler or Linux cron.
    Starting Price: $795 one-time payment
  • 5
    AD Browser

    AD Browser

    LDAPSoft

    AD Browser is a free Active Directory® browser by LDAPSoft. It is simple and easy to use tool designed to provide a read only access to the active directory. With AD Browser you can search for entries, view all available attributes and run SQL-LDAP Statments. AD browser provides both remote and local access to the Active Directory. The browser can be installed on the local machines or Domain Controller (DC). The browser is designed and developed with high level of security standards at our location in Morton Grove, IL, United States so that you can install this worry free on any or multiple DC's. The browser provides only a read-only interface so if you need to modify attributes and values you need our advanced tools like LDAP Admin Tool Standard and Professional Editions.
    Starting Price: $95 one-time payment
  • 6
    LDAP Administrator
    Work with several servers at once, organize them in groups, and easily copy data between them. LDAP Administrator supports LDAPv2 and LDAPv3 protocols and allows working with OpenLDAP, Netscape/iPlanet, Novell eDirectory, Oracle Internet Directory, Lotus Domino, Microsoft Active Directory, CA Directory, Siemens DirX, and any other LDAP server. Set various LDAP filters to display only the entries that match your criteria. Quickly access frequently viewed branches by setting a custom base DN to start browsing from. Jump to previously viewed objects using navigation history. And much more. Prevent directory data from being accidentally modified or deleted by making your LDAP server profiles read-only in LDAP Administrator.
    Starting Price: $250 one-time payment
  • 7
    LDAP

    LDAP

    LDAP

    ​LDAP is a comprehensive resource dedicated to the Lightweight Directory Access Protocol (LDAP), a mature, flexible, and well-supported standards-based mechanism for interacting with directory servers. Often utilized for authentication and storing information about users, groups, and applications, an LDAP directory server serves as a general-purpose data store applicable in various scenarios. Provides basic information about directory services and the LDAP protocol.​ Assists in finding the appropriate directory server, client API, or LDAP-based tools suitable for different environments.​ Offers links to various standards documents and reference guides for in-depth exploration of the protocol.​ Features posts related to directory services, including software release news, new standards documents, specifications, and how-to articles.​
  • 8
    AD Query

    AD Query

    SysOp Tools

    Completely free utility for Active Directory. Lookup a user or computer and view converted schema attributes that are normally not readable. A very handy tool for schema data lookup and comparison. No installer, just run the exe. 100% free utility for use in Active Directory domains. Search individual domain users and computer objects. View object Schema & LDAP data in one simple window. View binary Schema data in “human-readable” format. Easy lookup of email aliases, last login date, etc. Export search results to XML file, open with Excel. Small program size, super quick install. AD query software for user accounts is a great time-saving utility for the busy admin! AD Query is a free utility that allows quick and easy auditing of any user or computer object within Active Directory. Unlike the standard Users and Computers MMC, AD Query shows all data populated schema, LDAP and Exchange mail-enabled attributes for the user or computer object.
  • 9
    AD Admin Tool
    AD Admin Tool is a simple and easy to use tool which allows you to browse, edit, query and export from active directory. With this tool you can view and edit active directory data including binary and images, export and import data to/from most popular file formats, edit attributes using many built-in editors, manage active directory users and their privileges, mass update entries using SQL-like syntax and use a multitude of other admin functions designed for making your work with active directory comfortable and efficient. With AD Admin Tool you can quickly and easily create and edit entries. LDAP connection profiles give you the opportunity to connect to the active directory server in one touch and only work with the selected active directory connection. With this tool you can connect to the active directory locally, remotely or using SSL.
    Starting Price: $395 one-time payment
  • 10
    Atlassian Crowd
    Single sign-on and user identity that's easy to use. Manage users from multiple directories - Active Directory, LDAP, OpenLDAP or Microsoft Azure AD - and control application authentication permissions in one single location. Make life easy for your users by giving them one username and password to log in to all the applications they need access to. Seamlessly integrate all your Atlassian products - like Jira, Confluence, and Bitbucket- to give your users one simple single sign-on (SSO) experience. Map any combination of directories to a single application – perfect for managing users not in your main directory - and manage authentication permissions in the same place. Get started with connectors for AD, LDAP, Microsoft Azure AD, Novell eDirectory, and more. You can even create your own custom connector. Can't make group changes in your directory? Keep your users in LDAP and define their authentication permissions in Crowd.
    Starting Price: $10 one-time fee
  • 11
    Active Directory Reports (AD Reports)
    Active Directory Reports Lite is the free edition of MaxPowerSoft's Active Diretory Reports (AD Reports). The most intuitive Active Directory reporting product. Within 2 easy clicks you can be off and running reports. AD Reports was built around an intuitive easy to use user interface. Update any existing or create your own custom reports. Include predefined or any Active Directory LDAP attribute and build your own LDAP filter. Accurately reports real time information of your Active Directory Servers. It is the most accurate on the market. In a multi-domain controller environment simply compare our results to any of the competitors. Simply stated, if you have administrator rights on your computer and are able to see the domain, our product just works. No messy database setup, no MSMQ problems, no bloated web server setup. We built everything internal and no we don't use a web server.
    Starting Price: $299 per year
  • 12
    C2 Identity

    C2 Identity

    Synology C2

    Easily grant or revoke user access to company resources with group management. Access the admin console from a browser to manage individual or groups of user accounts. Let users manage their own credentials and personal information through a self-service portal. Centrally manage users, groups, workstations, and single sign-on (SSO) for Software as a Service (SaaS) applications across your entire organization. Easily migrate users from an LDAP server, Windows AD server, Microsoft 365, Google Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
    Starting Price: $19.99 per month
  • 13
    SageVue

    SageVue

    Biamp

    SageVue gives you immediate visual feedback regarding the health of your system. If you want to get granular, you can do that too. And yes, SageVue allows you to traverse subnets, giving you access to all of your systems from a single administrative console. SageVue allows you to update firmware remotely, either on a device-by-device basis or in groups, it’s up to you. Choose from the most recent firmware releases, and reboot individual devices via SageVue if needed. You are in control. SageVue intelligently interfaces with LDAP infrastructure, which makes user administration so much easier. Map LDAP groups to user roles in SageVue, and assign granular access privileges. SageVue lets you configure Tesira VoIP-enabled devices directly, no software required. If you’re ready to take the plunge and start using SageVue, we’re here to support you.
  • 14
    AdRestore

    AdRestore

    Microsoft

    Windows Server 2003 introduces the ability to restore deleted ("tombstoned") objects. This simple command-line utility enumerates the deleted objects in a domain and gives you the option of restoring each one. Source code is based on sample code in the Microsoft Platform SDK. ADInsight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications. Use its detailed tracing of Active Directory client-server communications to solve Windows authentication, Exchange, DNS, and other problems. ADInsight uses DLL injection techniques to intercept calls that applications make in the Wldap32.dll library, which is the standard library underlying Active Directory APIs such ldap and ADSI. Unlike network monitoring tools, ADInsight intercepts and interprets all client-side APIs, including those that do not result in transmission to a server.
  • 15
    ecotime

    ecotime

    Huntington Business Systems

    Ecotime can easily integrate with your existing payroll /human resources system and supports active directory, LDAP and other third-party single-sign applications. HBS designed the Ecotime® application to be the most powerful and flexible workforce management system available. Ecotime® utilizes both industry-wide best practices and the most advanced technologies available. Ecotime® is fully scalable, the same applications are used for companies as small as 39 employees and as large as 250,000 employees, allowing the system to grow with your organization, and is currently implemented in many companies in many industries. The application can easily integrate with your existing payroll/human resources system and supports active directory, LDAP and other third-party single-sign applications. Ecotime® has been designed to provide all employees the ability to use the most appropriate time entry method for their work situation.
  • 16
    Percona Server for MongoDB
    Percona Server for MongoDB is a free and open-source drop-in replacement for MongoDB Community Edition. It combines all the features and benefits of MongoDB Community Edition with enterprise-class features from Percona. Built on the MongoDB Community Edition, Percona Server for MongoDB provides flexible data structure, native high availability, easy scalability, and developer-friendly syntax. It also includes an in-memory engine, hot backups, LDAP authentication, database auditing, and log redaction.
  • 17
    AD FastReporter
    AD FastReporter is a great way to make generating, storing, scheduling and sharing AD reports easier and faster. It’s straightforward to use so you don't need to be a scripting or LDAP expert. With our free version, you can use a range of built-in forms to generate reports, while our Pro version provides additional tools to help you create your own customized report forms. AD FastReporter is an Active Directory reporting tool that saves valuable time for you and your business, no knowledge of scripting or LDAP is required. Browse through the built-in report forms to find the one most suitable and then customize it if necessary. AD FastReporter is one of the fastest reporting tools available and enables you to generate complex reports quickly and accurately. Our user interface is designed for all levels of knowledge. AD FastReporter sets you up easily and quickly.
    Starting Price: $299 one-time payment
  • 18
    Afterlogic Aurora
    Groupware system for businesses and providers, backed with mobile apps. Your private cloud combining groupware, file storage and email in a single, unified environment. Clean and modern interface. Can work with your existing mail server or use its own for the complete solution. iOS/Android apps for Email and Files let your users just type their email/password and never deal with mail server settings or blocked IMAP/SMTP ports. Can be integrated with LDAP authentication or LDAP address book, along with OAuth 2.0 authentication and resources, like Google Drive or Dropbox.
    Starting Price: $99.00/one-time
  • 19
    Activate

    Activate

    Activate

    Activate is an enterprise management and automation solution that manages a user's Identity, Access and Digital Workspace. It's fully integrated with Microsoft Suite offerings such as Active Directory, Office 365 and Azure AD. Activate enables users to request, approve and manage common IT systems like Active Directory, Exchange, Office 365 and Azure for themselves and other users in the organization. Activate's integration of Identity Management and Service Management into a single product enables stream-lined management of a User's Lifecycle from On-boarding to Off-boarding. Activate's virtual LDAP technology allows Azure AD to be managed in the same way as Active Directory. This means that services can be transitioned from on-premise to the cloud in a seamless manner without user service interruptions.
    Starting Price: $5.00/one-time/user
  • 20
    Hornetsecurity Email Signature and Disclaimer
    Every outgoing email from your company is commercially important and a business card at the same time. A uniform and legally compliant appearance is therefore a basic requirement. Create consistent email signatures and email disclaimers for your entire organization quickly and easily. Design group-based email signatures and disclaimers that add compliance functions to your external corporate communications and highlight your messages creatively and individually. By integrating Active Directory, the signatures of all users are automatically filled with the contact data from the Active Directory profile. Even the smallest adjustments, such as a change of telephone number, are immediately included in the synchronization via LDAP to remain up-to-date.
  • 21
    Cherokee

    Cherokee

    Cherokee

    Cherokee is an innovative, feature-rich, lightning-fast and easy to configure open source web server designed for the next generation of highly concurrent secured web applications. All the configuration is done through Cherokee-Admin, a beautiful and powerful web interface. Cherokee supports the most widespread web technologies, FastCGI, SCGI, PHP, uWSGI, SSI, CGI, LDAP, TLS/SSL, HTTP proxying, video streaming, content caching, traffic shaping, etc. Cherokee runs on Linux, Mac OS X, Solaris, and BSD. It is highly efficient, extremely lightweight and provides rock-solid stability. Among its many features, there is one that deserves special credit, a user-friendly interface called cherokee-admin that is provided for a no-hassle configuration of every single feature of the server. This administration interface allows you to configure the webserver without having to worry about editing a text file written with a certain syntax.
  • 22
    Symas LMDB

    Symas LMDB

    Symas Corporation

    Symas LMDB is an extraordinarily fast, memory-efficient database we developed for the OpenLDAP Project. With memory-mapped files, it has the read performance of a pure in-memory database while retaining the persistence of standard disk-based databases. Bottom line, with only 32KB of object code, LMDB may seem tiny. But it’s the right 32KB. Compact and efficient are two sides of a coin; that’s part of what makes LMDB so powerful. Symas offers fixed-price commercial support to those using LMDB in your applications. Development occurs in the OpenLDAP Project‘s git repo in the mdb.master branch. Symas LMDB has been written about, talked about, and utilized in a variety of impressive products and publications.
  • 23
    Bopup Communication Server
    Bopup Communication Server is an in-house enterprise messaging server built to provide efficient and private communication over networks of any size. The server meets most of the critical business needs, such as centralized management, the Active Directory (LDAP) support, message and file transfer logging. It can be easily deployed over the business infrastructure to unite the entire company's offices and other locations into one internal IM workspace with control over messaging groups, user permissions to view others and send messages and documents, message and transfer archives with printing support. Since the server stores and delivers offline messages and files, users never lose information they are supposed to receive. Messaging is encrypted with strong algorithms so personal and group conversations are safe and secure even if data is sent via the Internet.
  • 24
    Asgardeo
    Asgardeo helps developers implement secure authentication flows to applications in a few simple steps. Easily integrate single page, regular web, and mobile applications. SDKs that enable working with various technology stacks. Enable social sign-in with Google, Facebook, and GitHub using pre-defined templates (with more to follow). Configure external identity providers that can connect with open standards like OpenID Connect and SAML to your application. Manage your customers, employees, and partners with (default) supported onboarding and management workflows. Use Asgardeo provided directory or plug in your own LDAP or Active Directory via an agent. Choose from a variety of methods such as Email OTP, SMS OTP, and TOTP for 2FA. Define multiple steps and configure options according to user requirements. Unlock the full application experience by focusing on the business logic and enable login and secure access to end-users.
  • 25
    Access Auditor

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning. Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls. SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week.
  • 26
    CA RFID Asset Management
    Control and monitor your fixed assets with an intuitive graphical 100% web interface. The application records every asset movement so you can know when and where your assets have been. It doesn´t matter what kind of sensing you need, our platform is compatible with fixed and mobile readers. Depending on the user profile it can have read-only or admin access. We have LDAP compatibility. Automatically receive event-triggered alarms through e-mail or online messages with the event details.
  • 27
    WiKID Authentication System
    Easily meet PCI-DSS 3.2 with our latest release. Use WiKID two-factor authentication for service and privileged accounts instead of sharing passwords and storing them in spreadsheets or vaults. Prevent pass-the-hash attacks and stop attackers from escalating to admin rights! See how to set it up. Our Enterprise version is free for up to 5 users. Perfect for small organizations or large enterprises that need extended testing. This is the complete Enterprise version, not crippleware. Thanks to broad protocol support - RADIUS, LDAP, TACACS+, SAML and native Active Directory WIKID works with all your remote access and privileged access management tools, including Cisco, Checkpoint, Fortinet, pfSense, and all enterprise-class VPN solutions whether IPSec, PPTP or SSL. We've helped hundreds of organizations implement two-factor authentication using standard protocols. Download our eGuide on how to integrate Active Directory for authorization.
    Starting Price: $2.00/month/user
  • 28
    MemberProtect

    MemberProtect

    InetSolution

    MemberProtect is designed for professional programmers to easily integrate into secure online systems, such as ACH, Online Banking, and wire transfer applications. MemberProtect is the most trusted user authentication, data encryption, and user management framework in the banking and credit union industries today. Based on roles & privileges model. Supports millions of users and organizations. Extremely granular application security. Powerful encryption that secures databases at the column level. Encrypt email messages and flat files stored anywhere on your network. Thorough logging, even failed attempts, of all data access. Protect member data from hackers & unauthorized staff, even beyond the limitations of firewalls, SSL, and operating systems. Leverage MemberProtect to develop secure connections with third-party APIs. Access to any web-based system, including support for LDAP.
  • 29
    Roundcube

    Roundcube

    Roundcube

    Browser-based multilingual IMAP client with an application-like user interface. It provides full functionality you expect from an email client, including MIME support, address book, folder manipulation, message searching and spell checking. Drag-&-drop message management. Full featured address book with groups and LDAP connectors. Canned response templates. Responsive skin (multi-device support).There are thousands of services that make use of Roundcube to provide webmail to millions of users. We love to see our application in so many hands and believe it is essential for society at large to have Open Source software available for a crucial task such as communication. Below is a list of services that not only use, but actively contribute to Roundcube and where usage of those services helps to improve and further develop Roundcube webmail. These are the services that make it possible for us to continue improving our software and to make it freely available for everybody.
  • 30
    Doccept

    Doccept

    Kensium Solutions

    Doccept is a multi-user Document Management System (DMS) that allows businesses to securely organize content. A Document Management System (DMS) is essential for organizations that aspire to “Go Paperless". It can be overwhelming for today’s businesses to effectively manage the legacy of documents stored in different places. Electronic Document Management is a requirement for a variety of industries including Biotech & Pharmaceuticals, Media, Telecom, Manufacturing, Banking, and Tax/Accounting. When large amounts of client data or transaction histories need to be retained over long periods of time, Doccept can help. The concept comes with a detailed API guide, giving you the ability to integrate with any third-party application seamlessly. The concept supports integration with LDAP (Lightweight Directory Access Protocol) and Active Directory to map User authentication without creating a separate account.
  • 31
    ClipBucket

    ClipBucket

    ClipBucket

    Launch your own branded Multi-Screen Video-on-Demand (VOD) Platform in just 1-Click! ClipBucket revenue Sharing System offers the admin to manage the RPM by regions. Looking for Live Streaming solutions? ClipBucket can help you go-live with your content. With our LDAP integration you can easily use your AD credentials to log into ClipBucket You can add Preroll, Midroll, Postroll and banner ads by using local videos and images. ClipBucket provides detailed statistics about your website like Users, New users, Videos and photos ClipBucket provides 2 types of Adaptive streaming solutions, Admin can choose any of these streaming. ClipBucket offer end-to-end security to ensure that your video content can only be watched by authorized.
    Starting Price: $349.30 per month
  • 32
    PowerTerm WebConnect HostView
    In today's economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm® WebConnect HostView web-to-host emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Centrally manage configuration and software updates - save on time and administrative resources. Increase productivity; enable anytime, anywhere access to business-critical applications using a standard web browser, regardless of the user's physical location. Reduce costs associated with individual licensing, maintenance, support and updates. SSL, SSH, SFTP, Active Directory and LDAP integration, Single Sign-On, authentication (including Kerberos), RADIUS, RSA® SecurID® and SecurEnvoy® SecureAccess and SecurICE two-factor authentication support, and more.
  • 33
    Veyon

    Veyon

    Veyon Community

    Veyon provides a user interface that has been optimized for easy use and fast access to all important features. With Veyon you always have full control over your classroom. You can see all computer screens in an icon view and access individual computers with just one click. Taking screenshots of computers is a one-click operation as well. Draw attention to your lesson by locking all computers and blocking input devices with the help of just one button. The demo feature allows you to share your (or a student's) screens with all students. This way everyone can watch the screen contents of the presenting person in real time. There are two demo modes available: In fullscreen mode, all input devices are locked during the presentation. In window mode, users can simultaneously adapt the demonstrated workflow. Veyon can use the information already stored on your LDAP or ActiveDirectory server.
  • 34
    Kallithea

    Kallithea

    Kallithea

    Kallithea, a member project of Software Freedom Conservancy, is a GPLv3'd, Free Software source code management system that supports two leading version control systems, Mercurial and Git, and has a web interface that is easy to use for users and admins. You can install Kallithea on your own server and host repositories for the version control system of your choice. Supports both Mercurial and Git wire protocols, accessible over HTTPS and SSH. A powerful access management system lets you decide who has access to the repository, and what operations they’re entitled to do. All requests are authenticated and logged, giving the administrator an ability to review users’ activity. Kallithea supports LDAP, making it easy to use your existing authentication system. You can integrate your instance with an issue tracker of your choice using the JSON-RPC API and the extensions interface.
  • 35
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 36
    Protectimus

    Protectimus

    Protectimus Limited

    Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin. The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon, and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development. Dynamic Strong Password Authentication integrates directly with Microsoft Active Directory (or any other user directory) to add a six-digit password onto users’ static passwords. Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password.
  • 37
    LISTSERV

    LISTSERV

    L-Soft International

    LISTSERV is the original email list management solution brought to you by L-Soft International. Offered as an in-house software or hosted service, LISTSERV allows users to manage dozens to millions of email subscribers in one central interface. LISTSERV lists organize subscribers under one central email address so there is no need to remember subscriber information when you send an email. Simply send your message to your list's address and the message will be distributed to all of the list subscribers. Configure one-way lists for alerts and newsletters or two-way discussion lists for collaboration between organization members. Through the LISTSERV web interface, subscribers can create an account to manage their subscription settings, view previous mailings, and send emails to two-way discussion groups. Features include database connectivity, LDAP integration, and automatic bounce handling. No matter your organization's size or structure, LISTSERV can be configured to work for you.
    Starting Price: 1,000.00/year
  • 38
    SoftNAS

    SoftNAS

    Buurst

    SoftNAS is a cloud-native, software-defined, full-featured enterprise cloud NAS filer product line for primary data storage, secondary storage and hybrid cloud data integration. It enables existing applications to securely migrate to and connect with the cloud without re-engineering. With enterprise-class NAS features like: high-availability, deduplication, compression, thin-provisioning, snapshots, replication, cloning, encryption (at rest and in transit), LDAP and Active Directory integration, and support for NFS, CIFS, iSCSI or AFP storage protocols, SoftNAS protects mission-critical and primary, active/hot data, backup/archive data and makes cloud data migration faster and more reliable. SoftNAS offers the broadest range of storage options in terms of price vs. performance and backend storage selection, on-demand at petabyte scale across the AWS and Azure Marketplaces or on-premises on VMware.
  • 39
    Filestash

    Filestash

    Filestash

    Filestash is a self-hosted web application that acts as a frontend to your data storage. It supports a wide range of storage providers, including S3, SFTP, FTP, FTPS, Backblaze B2, Minio, WebDAV, Git, LDAP, MySQL, CardDAV, CalDAV, Dropbox, and Google Drive. Filestash provides a user-friendly interface for managing your files and folders, including features such as: File and folder browsing File uploading and downloading File and folder creation, moving, and deletion File and folder sharing File editing Image preview Music player Network drive support Filestash is also highly customizable, with a variety of settings and options that you can adjust to meet your specific needs. For example, you can choose which features to enable or disable, set user permissions, and customize the look and feel of the application.
    Starting Price: $150 per month
  • 40
    eFRS

    eFRS

    eFRS

    Stop wading through "almost there" mobile forms products and start with a solution designed for enterprise. Handle complex business rules, and secure enterprise mobile forms and mobile form elements based on group permissions, geolocation, signatures, and photos. It's all included. Integrates with your Active Directory / LDAP servers. On-site hosting or Cloud plans are available. eFRS has been designed to support almost any form, and we are constantly amazed at the new uses our customers discover for the system. An eFRS form is a hybrid between a standard paper form, and a custom-developed app. You can apply rules and logic to inputs to ensure business requirements are met before data is collected. If you are not sure the system will meet your requirements, please contact us and we will discuss the best approach. We used our expertise in delivering apps to some of the largest mining, energy and government organizations in the world to develop the right system for enterprise data.
    Starting Price: $5 per month
  • 41
    Delinea Cloud Suite
    Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions.
  • 42
    S-Filer Portal

    S-Filer Portal

    OKIOK Data

    S-Filer Portal™ is a complete, on premise solution that allows large and small organizations to meet a wide range of secure file transfer, storage and sharing business requirements. It includes the functionality typically found in much more expensive Managed Secure File Transfer (MFT) and Enterprise File Sharing and Synchronization (EFSS) solutions. Unlike file sharing solutions designed for personal use, S-Filer Portal has been designed right from the start for enterprise use, resulting in better manageability and security. All files are stored encrypted in secure virtual vaults using AES 256 encryption and transferred securely using SSL/TLS and optional end to end encryption. Tight integration with Active Directory and LDAP provides internal users with Single Sign-On capability while external users are managed and authenticated in separate authentication domains.
  • 43
    PHPKB

    PHPKB

    Chadha Software Technologies

    PHPKB IS A KNOWLEDGE MANAGEMENT SOFTWARE THAT ENABLES ORGANIZATIONS TO LOCATE, CAPTURE AND SHARE INFORMATION SEAMLESSLY WITH CUSTOMERS, EMPLOYEES, AND STAKEHOLDERS. PHPKB knowledge management software improves staff efficiency, customer satisfaction, and business service quality. With unique features like LDAP support, open-source code, multiple admin user levels, web-based content creation, document management, and versioning; it makes publishing, sharing, and collaborating on knowledge easy. PHPKB provides a world-class authoring experience and can be customized to meet the needs of small to large-scale enterprises. It is the fastest, smartest way to share and manage your knowledge base content. Use it to share knowledge with others, publish and manage articles, white papers, user manuals, business processes, FAQs, online help, APIs, and any other type of information.
  • 44
    Red e App

    Red e App

    Red e App

    The single access point for non-desk workforces that secures, delegates, manages and maintains structure, permissions, and granular control of the employee's mobile connection. Acts as a dynamic relational database for your non-desk workforce, seamlessly and securely mapping to your existing corporate directory. Facilitates touchless change in high turnover environments. Extensible through SSO, LDAP, HRIS, AD, payroll systems, and more. Purpose-built for deskless employee communication and engagement, Red e App is the only mobile solution to truly overcome the BYOD challenges of the world's non-desk workforce. Managed by an intelligent engagement engine we call Shelbe, Red e App enables communication, document access, automation, and workflows as never seen before. Designed to enhance every aspect of your internal communications, Red e App extends any existing services, platforms, corporate directories, or SSO systems.
    Starting Price: $2 per user per month
  • 45
    ProMDM

    ProMDM

    ProMDM

    ProMDM is a mobile device management solution that provides end-to-end control of all mobile devices across the IT infrastructure, using standard MDM specifications for iOS, Android and Windows devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Dynamic Group management based on AD/LDAP groups, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automation for administrative tasks with Health check service Role base administration SSO with Client Certificate Authentication for Exchange, Sharepoint, Web sites iOS SSO with Kerberos for Safari and native apps (integration with ADFS or websites directly) MAM - Mobile App Management Samsung KNOX support Document management – Managed media support Photo sync for Android GPS location and tracking Android for Work support (ProMDM is certified Google Partner)
  • 46
    Axiom Protect

    Axiom Protect

    Axiom Protect

    To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference. Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks. Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Bringing trust through user's devices makes authentication more flexible and stronger. Multiple users on a single device or multiple devices for a single user is a business need. It's not hard if you have a good platform. Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. 99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometrics.
  • 47
    SecureIdentity MFA
    The simple ‘username and password’ approach alone is not strong enough to protect your business’ critical data. Log-ins can be compromised within minutes, making your private data vulnerable to threat. Our SecureIdentity platform provides the identity of the user, the device and the data they are working on, so you can prove exactly who is doing what at any time. MFA is best practice for layered data and privacy security. Our MFA solution integrates seamlessly with Microsoft’s Active Directory and other LDAP solutions, allowing you to reutilize your existing authentication database infrastructure, avoiding the need to re-architect, deploy, backup and manage a secondary user database. We believe users should be able to choose any personal device to be their authentication token, whether it is their mobile phone, tablet, laptop or even their desk phone.
  • 48
    DevOKR

    DevOKR

    DevOKR

    DevOKR is an enterprise OKR (Objectives and Key Results) software that helps organizations align teams around strategic goals and track performance. Core features include OKR management with weighted scoring, company strategy alignment, check-in and meeting modules, 360-degree feedback, competency assessment, year-end evaluation, AI-powered OKR generator and analysis, live organization charts, role-based dashboards, reporting and analytics, and a goal library. DevOKR integrates with 26+ tools including Slack, Microsoft Teams, Jira, Asana, Salesforce, HubSpot, GitHub, Google Sheets, and more. It supports Active Directory/LDAP and SSO for enterprise security. The platform includes OKR consulting, coaching, and customized training programs to ensure successful methodology adoption. Available in English and Turkish with data residency options.
    Starting Price: $3/user/month
  • 49
    Parallels Secure Workspace
    Parallels Secure Workspace is a unified workspace that offers a highly secure and audited access to your company files and legacy, web and SaaS applications in a browser-based workspace, accessible via any browser, on any device. Parallels Secure Workspace is non-intrusive and builds on top of your current architecture. It is deployed as a virtual appliance on all common hypervisors and will connect with standard protocols to your existing IT assets (e.g. RDP, WebDAV, LDAP, …). For end users, everything is available in a browser via Parallels Secure Workspace. No need to install agents, plug-ins, etc. Easy to install, manage and use, both for the user and the administrator. Drives cost reduction compared to alternative solutions, and optimizes TCO up to 81%.
    Starting Price: €100, per year, per concurrent
  • 50
    PYDIO

    PYDIO

    Pydio

    Empower team collaboration without putting your data at risk. Pydio Cells is opencore, self-hosted document sharing with security in its DNA. Does your organization have complex compliance and security issues? Are SaaS solutions out of the question for you? Pydio Cells gives you full control of your document sharing environment, combining fast performance, huge file transfer sizes, granular security, and advanced workflow automation in an easy-to-set-up and easy-to-support self-hosted platform. Simplified, centralized document access via workspaces and cells. Near-zero user learning curve. Secure mobile-native access via Pydio app (iOS, Android). Cells Flows automates common workflows to drive productivity. Seamless massive document transfer. Fully scalable for the big data world. Easy, safe SSO integration via OPEN ID, Active Directory, LDAP, SAML. Bridges and unifies all document sources via hardened API. Cells Flows automates repetitive, time-consuming task.