Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • iDenfy Reviews & Ratings
    249 Ratings
    Company Website
  • Fraud.net Reviews & Ratings
    56 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    182 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    1,037 Ratings
    Company Website
  • cside Reviews & Ratings
    25 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Guardz Reviews & Ratings
    118 Ratings
    Company Website

What is PingOne Protect?

Protect your accounts from takeovers, fraudulent registrations, and the fatigue associated with multifactor authentication by utilizing PingOne Protect's extensive capabilities. This advanced solution evaluates multiple attack vectors, assigns risk levels, and delivers insightful data, facilitating the deployment of countermeasures that effectively block potential dangers while allowing legitimate users to authenticate with ease. By employing intelligence-based policies, PingOne Protect synthesizes results from various risk factors to create a holistic risk score. This score is associated with specific policies that determine the amount of friction experienced by users during interactions, including methods such as CAPTCHA, password resets, selfie verifications, and push notifications. To maximize the accuracy of the predictors, consolidate them, incorporate signals from outside sources, and apply overrides when necessary. The predictors include bot detection, IP velocity, user velocity, unusual velocity patterns, discrepancies in user location, IP reputation assessments, use of anonymous networks, behavioral risks, user-based risk models, detection of new devices, identification of suspicious devices, and custom or third-party predictors, all of which contribute to a robust risk management strategy. By implementing these comprehensive strategies, organizations can greatly enhance their defenses against a wide range of cyber threats and maintain user trust in their security measures. This proactive approach not only secures sensitive information but also improves the overall user experience by minimizing disruptions.

What is Active Directory?

Active Directory functions as a central hub for storing information about a variety of objects in a network, which simplifies management and access for both users and administrators. It utilizes a structured format for data storage, allowing for a logical and hierarchical organization of directory information. This central repository, known as the directory, contains information about different Active Directory entities, typically including shared assets like servers, volumes, printers, along with user and computer accounts within the network. To gain a more comprehensive understanding of the Active Directory data repository, one can consult the section dedicated to the Directory data store. Integrated security protocols within Active Directory ensure secure logon authentication and regulate access to directory objects. With a single network logon, administrators can efficiently manage directory information and organizational hierarchies across the entire network while authorized users can easily access resources from any point within that network. Furthermore, policy-based administration enhances the management process, increasing efficiency even in complex network configurations. This system not only fortifies security measures but also optimizes resource management, thereby improving overall network operation effectiveness. By centralizing these functions, Active Directory becomes a vital component in maintaining a well-organized and secure networking environment.

Media

Media

Integrations Supported

Streamline AI
Cameyo
ChartHop
Coviu
Delinea Cloud Suite
ENow
Extreme Networks
Hexnode UEM
HostBill
Ionic
LogMeOnce
RealPresence
ScanMail
Securden Unified PAM
Silk Security
TimeShiftX
VideoWatch
Xpress Password
Zoho Directory

Integrations Supported

Streamline AI
Cameyo
ChartHop
Coviu
Delinea Cloud Suite
ENow
Extreme Networks
Hexnode UEM
HostBill
Ionic
LogMeOnce
RealPresence
ScanMail
Securden Unified PAM
Silk Security
TimeShiftX
VideoWatch
Xpress Password
Zoho Directory

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$1 per user per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Ping Identity

Date Founded

2002

Company Location

United States

Company Website

www.pingidentity.com/en/platform/capabilities/threat-protection/pingone-protect.html

Company Facts

Organization Name

Microsoft

Date Founded

1975

Company Location

United States

Company Website

azure.microsoft.com/en-us/services/active-directory/

Categories and Features

Fraud Detection

Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Popular Alternatives

Popular Alternatives

Tilt 365 Reviews & Ratings

Tilt 365

Tilt
Fit Predictor Reviews & Ratings

Fit Predictor

Secret Sauce