This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
MyVirtualDirectory Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of MyVirtualDirectory for G2 to provide buying insight. Below are some alternatives with more reviews:
1
JumpCloud
4.5
(3,874)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Rippling IT
4.7
(1,348)
Transform your organization’s IT operations with Rippling IT's unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to enforcing security policies, in a single dashboard. Seamlessly manage the entire employee lifecycle, automatically granting and revoking app access, configuring devices, and maintaining least-privilege controls. Enforce compliance with real-time monitoring, automated patching, and integrated endpoint protection. Streamline offboarding with instant lockouts and secure device recovery. Gain full visibility across hardware, software, and user risk without the complexity of multiple tools. Rippling helps your business cut costs, eliminate manual work, and strengthen security, so your team can move faster. Experience the power of unified IT
3
Okta
4.5
(1,163)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
4
Microsoft Entra ID
4.5
(886)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
5
OneLogin
4.4
(288)
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
6
CyberArk Workforce Identity
4.5
(127)
Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
7
ManageEngine ADManager Plus
4.5
(77)
Active Directory Management and Reporting Solution
8
Oracle Identity Management
3.8
(71)
Oracle Identity Management is a comprehensive suite of identity and access management (IAM) solutions designed to help organizations manage the entire lifecycle of user identities and access privileges across enterprise resources, both on-premises and in the cloud. By automating user provisioning, enforcing security policies, and ensuring compliance with regulatory requirements, Oracle Identity Management enhances operational efficiency and strengthens security postures.
Key Features and Functionality:
- Identity Governance: Manages user provisioning and deprovisioning, enforces access policies, and provides actionable identity intelligence for rapid remediation of high-risk entitlements.
- Access Management: Delivers risk-aware, end-to-end multifactor authentication (MFA) and single sign-on (SSO) capabilities, integrating identities and systems across cloud and on-premises environments.
- Directory Services: Offers scalable and flexible directory solutions that support growth without unnecessary over-provisioning, facilitating seamless expansion without impacting existing services.
- User Provisioning: Automates the creation and assignment of user accounts, reducing administrative overhead and minimizing human error.
- Identity Analytics: Utilizes machine learning to detect and prevent suspicious identity activities, enhancing security through proactive monitoring.
- Single Sign-On (SSO): Consolidates user credentials behind a single account with strong password policies, simplifying access to services and improving user experience.
- Multifactor Authentication (MFA): Implements secondary authentication controls to verify user identities, reducing exposure from stolen credentials.
- Risk-Based Authentication: Employs algorithms to assess the risk of user actions, blocking or reporting activities with high-risk scores.
- Identity Governance and Administration (IGA): Controls entitlements to reduce risks associated with excessive access and privileges.
Primary Value and Solutions Provided:
Oracle Identity Management addresses critical security challenges by ensuring consistent user access rules and policies across an organization, thereby reducing the risk of data breaches and unauthorized access. By automating identity-related processes, it enhances operational efficiency, reduces administrative costs, and ensures compliance with regulatory standards. The suite's comprehensive approach to identity governance and access management enables organizations to securely manage user identities, enforce security policies, and respond swiftly to evolving security threats, ultimately safeguarding sensitive data and maintaining trust in business operations.
9
HelloID
4.5
(32)
HelloID is a modern and secure cloud-based Identity & Access Management (IAM) solution. With one powerful cloud solution, you have an answer to the increasingly complex Identity Management issues within your organization.
10
Managed Microsoft AD
4.4
(29)
Use a highly available, hardened service running actual Microsoft® Active Directory (AD).
No Discussions for This Product Yet
Be the first to ask a question and get answers from real users and experts.
Start a discussion
Pricing
Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.



