Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • StrongDM Reviews & Ratings
    100 Ratings
    Company Website
  • Cerberus FTP Server Reviews & Ratings
    159 Ratings
    Company Website
  • HERE Enterprise Browser Reviews & Ratings
    2 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,755 Ratings
    Company Website
  • Google Chrome Enterprise Reviews & Ratings
    2,061 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    24 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    516 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    632 Ratings
    Company Website
  • Proton VPN Reviews & Ratings
    41,009 Ratings
    Company Website

What is XyLoc Security Server?

The XyLoc® Security Server (XSS) acts as a centralized platform featuring a web-based interface, specifically created to manage and monitor XyLoc users and their secure workstations throughout an organization. This innovative system allows IT administrators to deploy and oversee XyLoc across different network segments and user categories with remarkable ease, while also enabling detailed reporting and compliance assessments. By simplifying the administration, reporting, and management of XyLoc user configurations, it keeps a comprehensive log of all login activities, secure walk-aways, and return actions like walk-up recognition. Moreover, XSS provides seamless integration with XyLoc Single Sign-On, allowing for thorough management and reporting of SSO actions. The platform guarantees quick and secure resource access in shared computing environments, such as those that use “Kiosk Accounts.” Additionally, it offers compliance documentation, including requirements set by HIPAA, through encrypted audit logs that meticulously track user activities. Built to scale efficiently, XSS supports tens of thousands of users and is compatible with Active Directory® (AD) via a Schema Extension, as well as environments utilizing SQL Server®. Beyond its robust capabilities, XSS not only enhances security but also boosts productivity in enterprise contexts, making it an invaluable tool for modern IT infrastructure. This comprehensive system stands out due to its ability to adapt to the evolving needs of organizations, ensuring both efficiency and compliance are maintained.

What is Active Directory?

Active Directory functions as a central hub for storing information about a variety of objects in a network, which simplifies management and access for both users and administrators. It utilizes a structured format for data storage, allowing for a logical and hierarchical organization of directory information. This central repository, known as the directory, contains information about different Active Directory entities, typically including shared assets like servers, volumes, printers, along with user and computer accounts within the network. To gain a more comprehensive understanding of the Active Directory data repository, one can consult the section dedicated to the Directory data store. Integrated security protocols within Active Directory ensure secure logon authentication and regulate access to directory objects. With a single network logon, administrators can efficiently manage directory information and organizational hierarchies across the entire network while authorized users can easily access resources from any point within that network. Furthermore, policy-based administration enhances the management process, increasing efficiency even in complex network configurations. This system not only fortifies security measures but also optimizes resource management, thereby improving overall network operation effectiveness. By centralizing these functions, Active Directory becomes a vital component in maintaining a well-organized and secure networking environment.

Media

Media

Integrations Supported

Asset Panda
Caseware Corporation Tax
Cherwell HR Service Management
Compass
Cynomi
Enzoic for Active Directory
FastPass SSPR
IBM ProtecTIER
Josys
NxFilter
Opus Security
Preciate
Pulsedesk
RadiantOne
SecureIdentity PAM
SimpleSign
StrongDM
ThinkData Works
Workstorm

Integrations Supported

Asset Panda
Caseware Corporation Tax
Cherwell HR Service Management
Compass
Cynomi
Enzoic for Active Directory
FastPass SSPR
IBM ProtecTIER
Josys
NxFilter
Opus Security
Preciate
Pulsedesk
RadiantOne
SecureIdentity PAM
SimpleSign
StrongDM
ThinkData Works
Workstorm

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$1 per user per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Ensure Technologies

Company Website

www.ensuretech.com/products/xyloc-security-server/

Company Facts

Organization Name

Microsoft

Date Founded

1975

Company Location

United States

Company Website

azure.microsoft.com/en-us/services/active-directory/

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Popular Alternatives

CPTRAX for Windows Reviews & Ratings

CPTRAX for Windows

Visual Click Software

Popular Alternatives

TF2000 Reviews & Ratings

TF2000

ComputerProx
Change Auditor Reviews & Ratings

Change Auditor

Quest Software
EventSentry Reviews & Ratings

EventSentry

NETIKUS.NET ltd