User provisioning/governance software gives a single point of maintenance to manage user access to IT applications. Companies need identity governance programs to maintain organized records of user information such as personal information, account histories, or application credentials. These confidential records can be used by employees and administrators to retain information and regulations. IT managers and administrators utilize the information in these systems to automate tasks such as account creation, editing, or deleting, which can help facilitate employee lifecycle changes like onboarding, promotions, or termination. Human resource workers may utilize the databases as well to aggregate information about employees and monitor access requests. There is significant overlap between user provisioning software and cloud identity and access management. Many products function on a hybrid on-premise and cloud level, but user provisioning/governance tools may not be able to provide remote access. These products will also often integrate with or provide SSO/federation or password management capabilities.
To qualify as user provisioning/governance software, a product must:
User Provisioning/Governance reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.
Rippling is the first way for businesses to manage their HR & IT in one system — from employee payroll and benefits, to computers and software. Want to hire someone, for example? Just click a button, and Rippling can instantly: add new hires to your payroll and benefits, create their email, ship their work computer, and even create their user account across all your cloud apps, like Gmail, Slack, and Microsoft Office.
JumpCloud's Directory-as-a-Service® (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need access to. DaaS securely connects employees with systems, applications, and other resources through a single unified cloud-based directory, replacing the need for on premise solutions such as Active Directory® and LDAP. JumpCloud supports all major OS platforms and is designed to control and manage user access to both internal and external IT resources such as servers and applications.
OneLogin simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.
The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.
Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.
ERP Maestro makes managing access risk, compliance, and security in SAP® environments incredibly easy. Its award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and fraud and accelerating remediation. Its industry-leading segregation of duties (SoD) analysis is used by seven of the world's top 10 audit firms and empowers organizations to establish effective governance, risk, and compliance (GRC) processes.
Only Avatier delivers private instance, cloud-independent or on-premise Identity Management platforms in just minutes. This enables organizations to scale faster, innovate quicker, conquer and embrace change, to dominate their competition. Avatier's customer identity and access management platform integrates all back-office business applications and employee assets together and manages them as one. Our complete suite of integrated IDM solutions, called Identity Anywhere, are delivered and managed using the latest Docker container technology providing maximum flexibility, scale, compliance, and security to our customers.
HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.
Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.
Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.
Holaspirit is a complete web platform designed for teal organisation, especially Holacracy practitioners. Holaspirit eases the implementation and the every-day practice of Holacracy through many features such as Role management, Projects & Actions management or Meeting management. Thanks to the many possible integrations, a user-friendly UI and a multi-languages interface , holaSpirit make your Agile & Teal transition easier.
SMACS by Stack8 is the only tool that is exclusively focused on the operations and support aspects of managing Cisco Unified Communications. We developed this productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.
Provision/De-provision Office 365 User Licenses with full audit trail of when and to whom the licenses were assigned or removed. Create and manage Office 365 Licenses in bulk. View assigned licenses by Users or by License types or by usage count of each license type. Keep track of purchased versus assigned licenses with audit trail.
IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.
Control access to your online products and services with ease and precision. The 10Duke Entitlement Service allows you to take control of the delivery and licensing of your digital products. It provides an engine to manage customer access to any type of online content such as a game app, news content, video assets or software applications.
Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/groups, policies, events, services, installed applications, shares, permissions, printers, data sources etc. The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKWE's basket of Built-in reports provide powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. A single solution that serves your everyday needs of administrative tasks as well as complex data preparation tasks for assisting in compliance. ARKWE has been architected using the latest Microsoft .NET technology, bringing you the best-in-breed reporting solution for your entire Windows Network. ARKWE is highly optimized for performance (using native Windows API calls wherever appropriate), resulting in fast data collection of deeply embedded configuration data. Imagine scanning your vast network of workstations and servers without having to wait forever to see your reports! You can create data subsets for your network using ARKWE's powerful scan options and meaningfully segment your entire network for data collection and reporting. Windows Network Audit: NTFS Permissions Reports: Gather NTFS security permissions across servers and workstations in an entire domain. Effective Permissions: Generate Effective Permissions of groups and users on shares, folders and files permissions that have been explicitly set and those that have been inherited through groups and nested groups. Local Group Membership: Get the local groups settings of workstations. Network Inventory: Inventory your entire Windows network - servers, workstations, network resources, configuration settings etc.
The Clearswift Information Governance Server (IGS) lies at the heart of the Clearswift Aneesya Platform. Deployed centrally in an organization, it integrates with your own environment for enterprise single sign on and support for Clearswift SECURE Gateways, augmenting their Adaptive Data Loss Prevention functionality.
The Access Assurance Suite is an integrated suite of provisioning, governance and identity and access intelligence solutions that enables you to automate routine IAM tasks, identify and eliminate compliance issues as they occur, and predict and prevent the problems that lead to risk.
Fastpath Config AD integrates GP and Active Directory for efficient IT security management. GP security is a silo disconnected from the rest of the organization's security. It doesn’t have to be this way. Fastpath Config AD gives a company's administrator the option to connect GP users to Active Directory (AD) users and GP roles to AD groups. This makes it easy to assign GP security in a way that is familiar to the IT department. Running security through Active Directory reduces your access risk further by removing the need for an 'SA' role in your GP instance. CONFIG AD FEATURES - Manage Microsoft Dynamics GP security via Active Directory groups - Eliminates use of ‘sa’ and Administrator for better security management - Active Directory user disables/deletes are automatically synchronized with Microsoft Dynamics - Leading single sign on product for Microsoft Dynamics GP - Allows users to synchronize Windows IDs and passwords with Microsoft Dynamics GP - Windows password policy enforced for Microsoft Dynamics GP logins - Logoff users after periods of inactivity - Compatible with Citrix, Terminal Services, Remote Desktop Services, and Virtual Machines
Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.