List of LDAP Integrations
This is a list of platforms and tools that integrate with LDAP. This list is updated as of May 2026.
-
1
NextGen SSO
SSOGEN
"Secure, seamless access management tailored for every environment."We are excited to unveil a sophisticated single sign-on (SSO) solution that is tailored to protect both on-premises and cloud-based applications, while also reducing expenses, improving user experience, and providing extensive integration options with various SSO platforms. This next-generation Cloud SSO SaaS offering is distinct in that it is not a shared or multi-tenant service, and can be deployed in just a matter of minutes. It features a flexible tiered pay-as-you-go pricing structure with reasonable flat fees, includes complimentary multi-factor authentication, and provides exceptional round-the-clock support. The solution guarantees secure authentication and a wide array of integration capabilities with other SSO systems, facilitating seamless single sign-on across diverse environments. Furthermore, it offers ready-to-use support for mobile applications and adheres to standards compliant with both LDAP versions 2 and 3. High availability and disaster recovery features come standard, ensuring resilience and continuity. As a specialized firm in SSO software development, we are committed to helping organizations bolster their web security, protect critical applications, and counteract cyber threats, all while emphasizing an outstanding user experience for both employees and partners. Our goal is to provide cutting-edge security solutions that evolve alongside the ever-changing digital landscape, ensuring that our clients remain secure and efficient in their operations. With our innovative approach, we aim to redefine the future of secure access management. -
2
Access Auditor
Security Compliance Corp
Streamline user access management with automated efficiency today!Access Auditor streamlines the process of reviewing user access and entitlements by automating these tasks, while also providing alerts for any modifications to user access permissions and keeping track of separation of duties violations. The tool offers visibility into who possesses access rights, and it can integrate with any AD/LDAP, database, or REST API for user imports. Additionally, it allows for the modeling and definition of enterprise roles (RBACs), enabling comprehensive RBAC reviews and provisioning capabilities. Similarly, Access Manager facilitates the automation of user access rights provisioning and management, utilizing the same user-friendly interface, and is applicable to any systems incorporating a database, REST API, or LDAP. SCC's straightforward and effective method for Identity Management ensures quick success at an affordable price point, with Access Auditor achieving a remarkable customer success rate of 100%, capable of automating user access reviews in under a week. This efficiency makes it an invaluable tool for organizations seeking to enhance their access management processes. -
3
Asgardeo
WSO2
Streamline secure authentication effortlessly for seamless user experiences.Asgardeo streamlines the setup of secure authentication systems for developers, allowing them to establish these systems through a series of simple steps. It seamlessly integrates with single page applications, traditional web platforms, and mobile applications. The platform’s software development kits (SDKs) cater to a variety of technology stacks. Developers can effortlessly implement social sign-ins using well-known platforms such as Google, Facebook, and GitHub by utilizing pre-built templates, with plans to introduce even more templates in the future. Additionally, Asgardeo supports the configuration of external identity providers that can connect with open standards like OpenID Connect and SAML, which enhances the flexibility of applications. The platform comes equipped with strong management features for customers, employees, and partners, including built-in onboarding and workflow management capabilities. Users have the option to use the provided directory or to integrate their own LDAP or Active Directory through an agent for more efficient access. Asgardeo also accommodates a diverse range of two-factor authentication methods, such as Email OTP, SMS OTP, and TOTP, allowing for a tailored approach to meet user preferences. Developers can establish multiple authentication steps and configure various settings to align with specific user needs. By utilizing Asgardeo, developers can focus on refining the core functionalities of their applications while guaranteeing secure access and smooth login experiences for users. Ultimately, Asgardeo presents a well-rounded solution that effectively balances security with user experience, making it an appealing choice for developers seeking to enhance their applications. Furthermore, this comprehensive approach ensures that both user satisfaction and security remain top priorities throughout the development process. -
4
C2 Identity
Synology C2
Streamline user access management for enhanced organizational efficiency.Easily oversee user access to company resources through robust group management functionalities. The admin console is conveniently accessible via a web browser, allowing for the supervision of both individual accounts and groups alike. Users are empowered to manage their own credentials and personal information through a self-service portal, streamlining the process. Effectively coordinate user data, groups, workstations, and single sign-on (SSO) features for Software as a Service (SaaS) solutions across your organization. Transitioning users is made seamless whether from an LDAP server, Windows Active Directory, Microsoft 365, Google Workspace, or by importing a CSV file. Reduce the workload of IT staff by giving users the ability to reset passwords and update their secondary email addresses, phone numbers, and physical addresses, among other information. Additionally, implement on-premises LDAP servers to enable rapid local authentication for improved efficiency. Enhance the authentication experience for SaaS applications by utilizing SSO and streamlined user account configurations. With C2 Identity's low-latency hybrid architecture, swift offline authentication via local LDAP servers is not only achievable but also guarantees a hassle-free user experience. This thorough strategy not only bolsters security measures but also significantly boosts overall user satisfaction, creating a more efficient organizational environment. -
5
AD Browser
LDAPSoft
Effortlessly navigate Active Directory with secure read-only access.AD Browser, created by LDAPSoft, is a free tool designed for navigating Active Directory® with a focus on user-friendliness. This simple application enables users to engage with Active Directory in a read-only mode, allowing them to search for entries, review various attributes, and run SQL-LDAP queries. Users have the capability to connect to Active Directory either remotely or locally, and can choose to install the browser on their own machines or directly on Domain Controllers (DC). Developed with stringent security measures in our Morton Grove, IL, USA facility, AD Browser can be confidently used on one or several DCs. Because it exclusively provides a read-only interface, users interested in altering attributes or values must turn to our advanced solutions, like the LDAP Admin Tool available in both Standard and Professional Editions. This design guarantees that while users can effortlessly access and examine information, modifications necessitate the appropriate tools to uphold security and data integrity. Thus, AD Browser serves as an essential utility for organizations looking to efficiently manage their Active Directory while maintaining a secure environment. -
6
AD Admin Tool
LDAPSoft
Streamline your Active Directory management with effortless efficiency.The Active Directory Admin Tool is a highly user-friendly application specifically crafted for efficiently navigating, altering, querying, and exporting data from Active Directory. This multifunctional utility allows users to view and modify Active Directory data, including the management of binary files and images, while also supporting data import and export in various popular file formats. Users can take advantage of multiple built-in editors to adjust attributes, oversee user accounts and their permissions effectively, carry out bulk updates using SQL-like commands, and tap into a variety of administrative functions designed to simplify their Active Directory responsibilities. Moreover, the AD Admin Tool facilitates rapid creation and modification of entries, significantly boosting productivity. It also incorporates LDAP connection profiles, ensuring users have easy, one-touch access to the Active Directory server, which allows them to concentrate solely on their desired connection. In addition, it accommodates local, remote, or SSL connections to the Active Directory, providing both versatility and security in administrative operations, making it a comprehensive solution for managing directory services. Overall, this tool streamlines various tasks and enhances efficiency in managing Active Directory environments. -
7
LDAP Plus AD Help Desk Professional Tool
LDAPSoft
Streamline directory management and enhance compliance with ease.The LDAP Plus AD Help Desk Professional Tool is a powerful solution designed for the management of Active Directory and LDAP, providing a wide array of features for both administration and reporting purposes. This adaptable tool enables users to efficiently manage accounts, regulate permissions, and monitor user account statuses, while also overseeing other directory systems present within a network. It produces detailed reports for LDAP and Active Directory, which are essential for maintaining compliance with regulations such as SOX and HIPAA, in addition to supporting management oversight. Crafted with usability in mind, it offers help desk personnel and administrators a cohesive interface, thereby simplifying the management processes across both systems. The tool features an easy-to-navigate Windows-style interface that allows for seamless report generation for both AD and LDAP, which can be printed or exported in various formats, including Excel, CSV, and LDIF. Furthermore, it incorporates a straightforward wizard for scheduling reports, compatible with Windows Scheduler and Linux Cron, which enhances the automation of report generation for continuous oversight. This all-encompassing approach not only boosts the productivity of administrative duties but also facilitates more efficient compliance monitoring for organizations, ensuring that they remain aligned with regulatory standards. Users can expect a significant reduction in the time spent on manual tasks, leading to more focus on strategic initiatives. -
8
LDAP Admin Tool
LDAPSoft
Elevate directory management with powerful, user-friendly search tools.The Professional Edition of the LDAP Admin Tool boasts a comprehensive range of advanced features, including customizable predefined searches tailored for both LDAP and Active Directory, offering more than 200 one-click search options. This edition is particularly suited for professionals working in a business context, serving as a vital resource for administrators and business users who need quick access to directory structures via one-click searches and the capability to efficiently schedule export tasks. Understanding nested group assignments is often crucial when managing group memberships, and our software simplifies this by allowing users to effortlessly view the updated nested members of groups during these processes. In addition, SQLLDAP offers a straightforward, SQL-like syntax for both querying and updating LDAP, enabling users to visually create and modify queries through an easy-to-use drag-and-drop interface that incorporates keywords and attributes. This seamless integration of features not only enhances user productivity but also solidifies the LDAP Admin Tool's status as an essential resource for those tasked with managing directory services effectively. Furthermore, the combination of powerful functionalities and user-friendly design makes this tool an invaluable asset for any organization looking to streamline their directory management tasks. -
9
Delinea Cloud Suite
Delinea
Empowering secure access with zero-trust, compliance, and accountability.Enhance user access to servers through various directory services such as Active Directory, LDAP, and cloud platforms like Okta. By adhering to the principle of least privilege, it is essential to implement just-in-time access and allocate only the required permissions, thereby minimizing security vulnerabilities. It is crucial to identify privilege misuse, counteract potential threats, and ensure compliance with regulations through thorough audit trails and video documentation. Delinea’s cloud-native SaaS solution employs zero-trust principles, which effectively reduce the risk of privileged access misuse and address security weaknesses. With the ability to scale flexibly and perform efficiently, this solution adeptly handles multi-VPC, multi-cloud, and multi-directory environments. Users can log in securely across different platforms using a single enterprise identity, complemented by a dynamic privilege elevation model that operates just in time. Centralized management of security protocols for users, machines, and applications guarantees the consistent enforcement of MFA policies across all critical and regulated systems. Real-time monitoring of privileged sessions allows for immediate termination of any suspicious activities, thereby reinforcing overall security measures. Furthermore, this all-encompassing strategy not only strengthens your security posture but also fosters an environment of accountability and transparency within your organization, ultimately contributing to a more robust security framework. -
10
OpenMetadata
OpenMetadata
"Centralize, discover, and govern your metadata effortlessly."OpenMetadata functions as a holistic, open platform designed to integrate metadata, enhancing data discovery, observability, and governance through a unified interface. Leveraging a Unified Metadata Graph and over 80 pre-built connectors, it consolidates metadata from diverse sources including databases, pipelines, BI tools, and ML systems, which provides teams with a rich context to efficiently search, filter, and visualize their organizational assets. The platform is constructed on an API- and schema-first framework that enables flexible customization of metadata entities and relationships, allowing businesses to define their metadata architecture with accuracy. With just four core system components, OpenMetadata is designed for easy installation and operation, delivering scalable performance that allows both technical and non-technical users to collaborate effectively on tasks related to discovery, lineage tracking, quality assurance, observability, collaboration, and governance without requiring complex infrastructure. This adaptability positions it as an essential asset for organizations striving to maximize the potential of their data resources. Moreover, its user-friendly design fosters a collaborative environment where diverse teams can engage with data insights more intuitively. -
11
Openkoda
Openkoda
Accelerate insurance app development with freedom and flexibility.Openkoda serves as a dedicated application development platform designed specifically for the insurance sector. It empowers carriers, insurtech firms, managing general agents (MGAs), startups, and service providers to swiftly develop extensive web applications, APIs, and internal tools, significantly reducing development time compared to conventional methods, all while allowing teams to retain full control over their source code. Its foundation on an open-source framework mitigates the risk of vendor lock-in. Featuring a modular architecture and a selection of pre-existing templates, Openkoda accelerates vital insurance operations such as policy issuance, claims processing, endorsements, and renewals, all within scalable containerized environments that avoid imposing per-user fees. Moreover, Openkoda is equipped with specialized industry accelerators, which include an AI-enabled policy administration core, claims management workbenches, embedded insurance checkout features, and dashboards for underwriters that are capable of accessing external risk data or initiating machine learning models. This extensive range of features makes Openkoda an invaluable resource for organizations aiming to drive innovation in the insurance field, ultimately enhancing their operational efficiency and service delivery. -
12
PYDIO
Pydio
Empower collaboration securely with seamless document sharing solutions.You can enhance team collaboration while safeguarding your data effectively. Pydio Cells is a self-hosted, open-source document sharing platform designed with built-in security features. Are you facing intricate security and compliance challenges within your organization? Considering SaaS solutions could be beneficial for you. With Pydio Cells, you gain complete control over your document sharing setup. This platform expertly combines rapid performance, support for large file transfers, detailed cybersecurity measures, and sophisticated workflow automation, all within a user-friendly self-hosted environment. It offers centralized document access through workspaces or cells, ensuring a near-zero learning curve for users. Additionally, it provides secure mobile access via the Pydio app, compatible with both Android and iOS devices. The Cells Flows feature streamlines common workflows to boost productivity, while handling massive document transfers effortlessly. The system is fully scalable to accommodate large data needs and supports secure SSO integration through various protocols like OPEN ID, Active Directory, LDAP, and SAML. Furthermore, all document sources can be integrated and connected using a robust API, allowing Cells Flows to automate repetitive and labor-intensive tasks, thereby improving overall efficiency. By implementing Pydio Cells, organizations can achieve a seamless blend of collaboration and security. -
13
Doccept
Kensium Solutions
Streamline your documents, enhance security, and boost efficiency.Doccept is a flexible Document Management System (DMS) that supports multiple users, allowing businesses to organize their content securely and efficiently. For companies pursuing a "Go Paperless" strategy, a powerful Document Management System is essential, as it alleviates the challenges of handling numerous legacy documents found in different locations. This is particularly important for modern enterprises that often grapple with vast amounts of information. Various industries, including Biotech, Pharmaceuticals, Media, Telecom, Manufacturing, Banking, and Tax/Accounting, require effective Electronic Document Management solutions. Doccept is particularly advantageous for storing extensive client data or transaction records that need to be retained for long periods. Furthermore, it includes a detailed API guide that ensures smooth integration with any third-party applications. The system supports integration with LDAP (Lightweight Directory Access Protocol) and Active Directory, simplifying the authentication process by removing the necessity for separate user accounts. This feature not only boosts operational efficiency but also makes document management more secure and streamlined for organizations. As a result, Doccept emerges as a comprehensive solution tailored to meet the diverse needs of modern businesses. -
14
WiKID Authentication System
WiKID Systems
Streamline compliance and elevate security with effortless authentication.Our most recent update simplifies compliance with PCI-DSS 3.2 standards. WiKID's two-factor authentication has been introduced for both service and privileged accounts, eliminating the need to share passwords or store them in spreadsheets or vaults. With WiKID two-factor authentication, you can effectively thwart attackers from gaining elevated administrator rights by mitigating pass-the-hash attacks. Discover the setup process with our detailed guide. The Enterprise version supports up to five users, making it perfect for both small businesses and larger organizations requiring extensive testing capabilities. Unlike some alternatives, this Enterprise version is fully functional and not restricted in its features. It boasts extensive protocol compatibility, including RADIUS, LDAP, TACACS+, and SAML, and is seamlessly integrated with Active Directory. WiKID works harmoniously with all remote access and privileged access management systems, including renowned solutions from Cisco, Checkpoint, and Fortinet, as well as enterprise-grade VPN options like IPSec and PPTP. Our experience has enabled us to assist hundreds of organizations in implementing two-factor authentication through standard protocols. To gain insights on integrating Active Directory for authorization, be sure to download our informative eGuide. Additionally, incorporating WiKID can significantly enhance your organization's overall security posture. -
15
Kallithea
Kallithea
Empower your development with flexible, secure code management.Kallithea is a project associated with the Software Freedom Conservancy that serves as a Free Software source code management system, operating under the GPLv3 license, which incorporates two major version control systems: Mercurial and Git, while providing an intuitive web interface suitable for both users and administrators. This flexible tool can be set up on personal servers, allowing for the hosting of repositories that align with your selected version control system. It offers support for both Mercurial and Git wire protocols, which can be securely accessed through HTTPS and SSH. The sophisticated access management system allows you to specify user permissions for repository access and the actions they are permitted to take. Furthermore, every request is authenticated and logged, giving administrators the capability to effectively oversee user activities. Kallithea also features LDAP support, making it easier to incorporate your existing authentication systems. In addition, you can integrate your Kallithea instance with any issue tracker you prefer via the JSON-RPC API and the available extensions interface, which significantly enhances its project management capabilities. With these extensive features, Kallithea not only provides an effective solution for source code management but also streamlines collaboration among developers, ensuring a seamless workflow. -
16
i-PRO Video Insight
Panasonic i-PRO Sensing Solutions
Empower your security with limitless scalability and functionality.Video Insight distinguishes itself as an effective and intuitive enterprise Video Management System, equipped with a novel plug-in architecture that significantly enhances both scalability and functionality. This versatile VMS solution integrates fluidly with our MonitorCast Access Control platform, delivering outstanding system oversight and control alongside virtually limitless scalability. Importantly, VI7 does not require any licensing fees when used with i-PRO Extreme cameras, making it the most cost-effective enterprise-level VMS option available today. In addition, Video Insight provides a full range of powerful features designed specifically for enterprises, including Health Monitor, automated failover mechanisms, and support for an unlimited number of clients and users, along with compatibility with active directory/LDAP integration. With its advanced 64-bit processing capabilities, VI can support a remarkable number of cameras per server, ensuring boundless scalability while simplifying integration with existing legacy systems. This capability allows for centralized system administration and a host of additional features, positioning it as an ideal solution for organizations that aspire to elevate their video management systems. Ultimately, Video Insight is not just a tool but a comprehensive platform that empowers businesses to optimize their security and surveillance operations efficiently. -
17
Symas LMDB
Symas Corporation
Experience unparalleled speed and efficiency in database solutions.Symas LMDB stands out as a remarkably fast and memory-efficient database created specifically for the OpenLDAP Project. By employing memory-mapped files, it combines the rapid read capabilities typical of purely in-memory databases with the durability characteristic of traditional disk-based systems. Notably, despite its small footprint of just 32KB of object code, LMDB delivers exceptional performance; it truly exemplifies the ideal 32KB solution. The efficiency and compact design of LMDB are crucial to its outstanding functionality. For developers looking to implement LMDB in their projects, Symas offers fixed-price commercial support that enhances the integration process. Ongoing development is actively pursued in the mdb.master branch of the OpenLDAP Project’s git repository, ensuring that it remains current and effective. Furthermore, LMDB has gained recognition in a variety of notable products and scholarly articles, underscoring its adaptability and efficacy in different applications. This widespread acclaim reinforces LMDB’s reputation as an essential asset for developers in the tech community. Additionally, its unique features continue to attract interest from developers seeking robust database solutions. -
18
Axiom Protect
Axiom Protect
Empowering secure, adaptable IT solutions for modern businesses.Improving your varied IT infrastructures—regardless of whether they are on-premise, cloud-based, or hybrid—necessitates the deployment of multifactor security solutions specifically designed to accommodate the unique requirements of each system, service, workflow, and user preferences. Centralized management guarantees that your organization adheres to both operational needs and compliance regulations through well-articulated policies and settings that can be easily tailored with minimal effort. The incorporation of a sophisticated password management system that aligns with external LDAP or Active Directory frameworks enhances user administration, making it both streamlined and effective. Strengthening trust is essential, achieved by facilitating versatile and secure authentication methods across all user devices. In a business environment where multiple users might share a single device or where an individual may need access across several devices, implementing the right platform makes this process seamless. A critical component of this strategy is the understanding that all interactions center around data, emphasizing the importance of secure management for data both at rest and in transit across mobile devices, web applications, IoT, servers, and databases. Organizations can also adopt customizable security parameters that utilize various key lengths and encryption techniques without incurring the expenses associated with traditional VPN solutions. Moreover, the availability of SDKs and APIs significantly enhances integration capabilities, while advanced AI and deep learning technologies enable the construction of electronic Know Your Customer (eKYC) or remote access authentication systems with over 99% accuracy using facial biometrics, which simplifies user interactions. -
19
SageVue
Biamp
Empower your system management with seamless insights and control.SageVue offers immediate visual insights into your system's health status. For those interested in an in-depth analysis, there are also more detailed options available. It allows users to easily navigate through subnets, enabling the management of all systems from a single administrative dashboard. With SageVue, you can execute remote firmware updates on either individual devices or in bulk, depending on your needs. You have the option to choose from the most current firmware versions, and if required, you can reboot specific devices directly using the platform. This solution empowers you to take full control of system management. Furthermore, it integrates smoothly with LDAP systems, which greatly simplifies user administration. Users can correlate LDAP groups with specific roles in SageVue while setting precise access permissions. In addition, SageVue facilitates the direct configuration of Tesira VoIP-enabled devices without requiring any extra software. Embracing SageVue means you will have access to a dedicated support team, ready to help you transition smoothly and efficiently. This comprehensive platform not only enhances system management but also ensures you have robust support throughout your journey. -
20
Roundcube
Roundcube
Effortless email management with intuitive design and powerful features.A web-based multilingual IMAP client that boasts a user interface resembling that of conventional applications. This client provides all necessary email features, including MIME compatibility, an integrated address book, folder organization, message search capabilities, and spell-check functionality. Additionally, it facilitates effective message management through intuitive drag-and-drop options. Users have access to a detailed address book that supports group functionalities and LDAP integrations, along with customizable response templates. Its adaptive design guarantees optimal performance across various devices. Roundcube serves as the backbone for numerous services that deliver webmail solutions to millions, and we take great pride in its widespread utilization. We strongly advocate for the availability of Open Source software for essential communication needs, recognizing its significance for society at large. Below is a curated list of services that not only utilize but also actively participate in the development of Roundcube, underscoring how their engagement contributes to the ongoing improvement of our webmail software, ensuring it remains free and accessible to everyone. These collaborative initiatives are vital to our objective of keeping the software current and widely available, reinforcing the importance of community involvement in its growth. By fostering such partnerships, we can enhance user experience and maintain the sustainability of our project. -
21
Cherokee
Cherokee
"Empowering web development with speed, simplicity, and security."Cherokee is distinguished as a modern, feature-rich, incredibly fast, and user-friendly open-source web server designed to meet the needs of the next generation of secure, high-concurrency web applications. Its configuration process is effortlessly handled through Cherokee-Admin, a sophisticated web interface that streamlines server setup. The server boasts compatibility with various widely-used web technologies, including FastCGI, SCGI, PHP, uWSGI, SSI, CGI, LDAP, TLS/SSL, HTTP proxying, video streaming, and content caching, among others. Operating smoothly on platforms such as Linux, Mac OS X, Solaris, and BSD, it exemplifies lightweight performance and outstanding stability. One of its most notable features is the user-friendly cherokee-admin interface, which allows for easy configuration of all server aspects without the need to navigate complex text file syntax. This emphasis on user experience positions Cherokee as an appealing choice for developers looking for both robustness and simplicity. In addition, ongoing development and active community support continue to bolster its features, ensuring that it remains a viable option in the constantly evolving realm of web technologies. Overall, Cherokee combines advanced capabilities with accessibility, making it a valuable tool for developers of all skill levels. -
22
Vivi
Vivi
Transform classrooms into interactive hubs of collaboration and engagement.Seamlessly connect to your user database through LDAP and SAML, enabling bulk configuration and updates while also managing emergency broadcasts and digital signage. Whether your setup includes just one display in a classroom or extends to 10,000 displays across various campuses, Vivi provides the necessary flexibility. In a Vivi classroom environment, instructors are free to move around, engaging with both the display and their students from any spot, which greatly enhances student participation. This method redefines the traditional classroom by creating a more interactive learning environment, thereby promoting student engagement and ownership of their educational journey. Vivi is designed to be compatible with nearly every device and display, ensuring user-friendliness for all. With the approval of teachers, students can present their work on-screen, allowing for instant feedback and fostering a student-centered learning experience that is both interactive and empowering. Impressively, up to four students can simultaneously showcase their projects on a single display, encouraging collaboration as they analyze and discuss their varied approaches. This collaborative environment nurtures deeper understanding and promotes critical thinking skills among students, ultimately preparing them for future challenges. Additionally, the ability to share insights and experiences enriches the learning process, making education more relevant and engaging for all involved. -
23
ProMDM
ProMDM
Streamline your mobile management with unmatched security and oversight.ProMDM offers comprehensive mobile device management solutions, ensuring complete oversight of all mobile devices within an organization's IT framework. It adheres to established MDM standards for both iOS and Android platforms. Key Features: - Security Management - Profile and Configuration Management - Compliance Management Services - Device Management - Dynamic Group Management utilizing AD/LDAP groups, device characteristics, or manual inputs - Device Reporting - Health Check Services - Lifecycle Management Services - Mobile Certificate Management Services - Automation of administrative duties through Health Check Services - Role-based Administration - Single Sign-On (SSO) with Client Certificate Authentication for Exchange, SharePoint, and various websites - iOS SSO with Kerberos integration for Safari and Native Applications, including ADFS and direct website connections - Mobile Application Management (MAM) - Support for Samsung KNOX - Document Management and Managed Media Support - Photo synchronization capabilities for Android devices - Real-time Tracking and GPS location services - Support for Android for Work, with ProMDM being a certified Google Partner Moreover, ProMDM continuously updates its features to meet evolving security and management needs in the mobile device landscape. -
24
Kamailio
Kamailio
Efficiently power your VoIP systems with scalable communication solutions.Kamailio® is a powerful open-source SIP server that emerged from the earlier versions of OpenSER and SER, and is released under GPLv2+, designed to efficiently handle thousands of call setups per second. This versatile platform is ideal for building large-scale VoIP systems, facilitating real-time communication, managing presence, supporting WebRTC, enabling instant messaging, and accommodating numerous other applications. Moreover, Kamailio excels in scaling SIP-to-PSTN gateways, PBX systems, and media servers, such as Asterisk™, FreeSWITCH™, or SEMS, with remarkable ease. Its rich feature set encompasses support for asynchronous protocols like TCP, UDP, and SCTP, ensuring secure communication through TLS for voice, video, and text, in addition to compatibility with WebSockets for WebRTC. The server also fully supports both IPv4 and IPv6, offers straightforward instant messaging and presence functionalities via an integrated XCAP server and MSRP relay, and facilitates asynchronous operations effortlessly. Additionally, it includes IMS extensions for VoLTE, ENUM capabilities, along with features for DID and least cost routing, load balancing, and routing failover to enhance reliability. Kamailio's comprehensive suite of accounting, authentication, and authorization features ensures robust security, while it seamlessly integrates with a variety of backend systems such as MySQL, Postgres, Oracle, Radius, LDAP, Redis, Cassandra, MongoDB, and Memcached. With all these advanced capabilities, Kamailio stands out as a highly adaptable solution for contemporary communication infrastructures, making it a preferred choice among developers and organizations alike. -
25
AdRestore
Microsoft
Unlock seamless Active Directory management with powerful recovery tools.Windows Server 2003 includes a capability for recovering deleted objects, known as "tombstoned" items, which can be accessed through a simple command-line tool that lists these items in a domain and allows for their individual restoration. The utility's source code is based on examples from the Microsoft Platform SDK, making it a reliable resource for administrators. Furthermore, ADInsight functions as a real-time monitoring solution for LDAP (Lightweight Directory Access Protocol), specifically aimed at helping diagnose problems with Active Directory client applications. It features extensive tracing functionalities for the interactions between Active Directory clients and servers, empowering users to resolve issues related to Windows authentication, Exchange, DNS, and beyond. Utilizing DLL injection techniques, ADInsight captures and deciphers the calls made by applications to the Wldap32.dll library, which is essential for Active Directory APIs like LDAP and ADSI. What sets ADInsight apart from standard network monitoring tools is its ability to intercept and analyze all client-side API calls, including those that do not necessarily communicate with a server, thus granting a more profound understanding of Active Directory operations. This exceptional functionality renders it an essential asset for network administrators who are aiming to troubleshoot, optimize, and enhance their Active Directory environments effectively. Consequently, leveraging such tools can lead to improved operational efficiency and reduced downtime in network management. -
26
Courier
Double Precision, Inc.
Streamline communication and collaboration with flexible mail solutions.The Courier mail transfer agent (MTA) operates as an all-encompassing mail and groupware server that employs well-established protocols like ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. It provides a cohesive platform that offers various services, including ESMTP, IMAP, POP3, webmail, and mailing list options, enabling users to easily toggle specific features on or off based on their needs. Recently, the Courier mail server has rolled out essential web-based calendaring and scheduling tools within its webmail module, with intentions to develop more advanced groupware calendaring options in the near future. Importantly, the source code for the Courier mail server is crafted to compile across most POSIX-compliant operating systems that run on Linux or BSD-derived kernels, and it is also compatible with Solaris and AIX systems, assuming users employ the correct freeware add-on tools from Sun or IBM. The evolution of the Courier mail server is based on a synthesis of various interconnected projects that have shaped its present configuration, and it also integrates SMTP extensions designed to improve mailing list management capabilities. This makes Courier not just a flexible mail server, but also a valuable collaborative resource for users seeking efficient communication and organizational solutions. As the demand for integrated communication tools continues to grow, Courier is likely to expand its offerings to meet evolving user needs. -
27
Redactive
Redactive
Empower innovation securely with effortless AI integration today!Redactive's developer platform removes the necessity for developers to possess niche data engineering skills, making it easier to build scalable and secure AI-powered applications aimed at enhancing customer interactions and boosting employee efficiency. Tailored to meet the stringent security needs of enterprises, the platform accelerates the path to production without requiring a complete overhaul of your existing permission frameworks when introducing AI into your business. Redactive upholds the access controls set by your data sources, and its data pipeline is structured to prevent the storage of your final documents, thus reducing risks linked to external technology partners. Featuring a wide array of pre-built data connectors and reusable authentication workflows, Redactive integrates effortlessly with a growing selection of tools, along with custom connectors and LDAP/IdP provider integrations, enabling you to effectively advance your AI strategies despite your current infrastructure. This adaptability empowers organizations to foster innovation quickly while upholding strong security measures, ensuring that your AI initiatives can progress without compromising on safety. Moreover, the platform's user-friendly design encourages collaboration across teams, further enhancing your organization’s ability to leverage AI technologies. -
28
KX Delta Platform
KX
Unlock your data's potential with powerful insights and security.The KX Delta Platform is a sophisticated data management solution tailored for enterprises, engineered to effectively capture, analyze, and retain both real-time and historical data. It is constructed on kdb+, the leading time-series database globally, and provides adaptable configuration options to meet vital deployment needs, including redundancy and load balancing, while ensuring maximum uptime. The system is fortified with robust security features such as LDAP authorization and data encryption, which uphold stringent compliance with data sensitivity and security standards. Users can leverage its capabilities to visualize information through an intuitive dashboard builder and engage with dynamic data playback, while automated report generation streamlines the reporting process. This platform not only serves as a powerful tool for program management but also facilitates the administration, manipulation, and exploration of extensive real-time and historical datasets. Additionally, its high-speed processing capabilities make it ideal for mission-critical applications, enabling organizations to operate efficiently and effectively. Ultimately, the KX Delta Platform stands out as an essential resource for businesses aiming to harness the full potential of their data. -
29
Endian
Endian
Robust, flexible network security tailored for every business.Endian UTM is a comprehensive Unified Threat Management (UTM) solution designed to provide robust network security for businesses of all sizes. It includes an array of advanced functionalities, such as a stateful firewall, intrusion detection and prevention systems (IDS/IPS), antivirus and antispam tools, and VPN solutions (both SSL and IPsec), complemented by web and email content filtering as well as quality of service (QoS) management. The solution is available in both hardware and software formats, providing flexible deployment options tailored to different networking requirements. By managing multiple network zones (Red, Green, Orange, Blue), Endian UTM effectively segments and protects various areas of the network. Its intuitive web-based interface allows administrators to easily modify and monitor security settings, track real-time traffic, and generate detailed reports. Moreover, Endian UTM features vital capabilities such as multi-WAN support with automatic failover, VLAN support, and various integration options, which significantly enhance its functionality for contemporary enterprises. This solution not only ensures a high level of security but also promotes the optimization of network performance, making it an invaluable asset for organizations seeking to safeguard their digital environments. Ultimately, Endian UTM empowers businesses to navigate the complexities of network security with confidence and efficiency. -
30
Aranda Service Management
Aranda SOFTWARE
Transforming IT service management with automation and intelligence.Aranda Service Management is an all-encompassing IT Service Management (ITSM) software designed to enhance organizational productivity through automated service solutions. It aligns with ITIL 4 best practices and includes an intuitive portal with self-service functionalities that empower clients to submit requests, monitor case statuses, and utilize a centralized knowledge base for self-help at any time. Noteworthy advanced features encompass a priority matrix, financial management, organized approval workflows, import/export functionalities, and mechanisms for capturing user satisfaction feedback. By leveraging artificial intelligence and machine learning, it delivers exceptional self-service experiences while reducing support costs. Furthermore, it supports multi-project environments, allowing organizations to manage diverse service areas beyond IT without requiring additional infrastructure, thereby fostering operational efficiency. This adaptability renders it an essential tool for enterprises aiming to optimize their IT and service management workflows, ultimately leading to improved performance and customer satisfaction. The software's robust capabilities make it suitable for a wide range of industries seeking to enhance their service delivery. -
31
MemberProtect
InetSolution
Empowering developers to secure digital banking environments effortlessly.MemberProtect is designed specifically for professional developers, enabling them to effortlessly integrate it into secure digital environments such as ACH, online banking, and wire transfer systems. It serves as the most dependable framework for user authentication, data encryption, and user management in the banking and credit union industries today. Employing a model based on roles and privileges, it is capable of supporting millions of users and organizations while providing exceptionally granular application security. Its powerful encryption features protect databases at the column level and also apply to email communications and flat files stored across various networks. Furthermore, it ensures thorough logging by documenting even failed data access attempts, thereby helping to protect member information from hackers and unauthorized access, effectively exceeding the protective capabilities of firewalls, SSL, and operating systems. With MemberProtect, developers can create secure links to third-party APIs, ensuring broad compatibility with any web-based system and facilitating integration with LDAP services. This all-encompassing strategy not only boosts security but also enables organizations to uphold trust and adhere to compliance in a fast-changing digital environment, ultimately fostering a safer online experience for all users. -
32
CA RFID Asset Management
Tecnologias
Effortless asset management with real-time tracking and insights.Effortlessly manage and monitor your fixed assets through a completely web-based, intuitive graphical interface. This application diligently tracks every asset movement, offering valuable insights into their locations and histories. Whether your needs require stationary or portable sensing technology, our platform accommodates both options seamlessly. User access can be tailored to various profiles, granting either read-only or administrative permissions as needed. Furthermore, our system integrates with LDAP for efficient authentication processes. You will receive automatic alerts triggered by specific events through email or online notifications, which include comprehensive details about the incidents. This proactive approach ensures you are consistently updated about your assets, allowing for effective oversight and management. In essence, our solution empowers you to maintain complete visibility and control over your asset portfolio. -
33
PowerTerm WebConnect HostView
Ericom Software
Optimize IT assets for efficiency, security, and flexibility.In today's economic environment, businesses can greatly enhance their efficiency and flexibility by strategically optimizing their IT assets. Ericom's PowerTerm® WebConnect HostView offers a valuable solution that facilitates web-to-host emulation, enabling organizations to achieve this optimization. By leveraging the benefits of PC-client access software alongside server-based computing, companies can significantly improve their older systems. This platform supports centralized management of both configurations and software updates, thereby saving time and reducing the administrative burden. Additionally, it boosts productivity by providing access to essential business applications from any location at any time through a standard web browser, regardless of where users are situated. Moreover, this solution leads to reduced costs associated with individual licensing, maintenance, and support, as well as updates. It also incorporates strong security measures, including SSL, SSH, SFTP, and seamless integration with Active Directory and LDAP, plus support for Single Sign-On and various authentication options such as Kerberos, RADIUS, RSA® SecurID®, and SecurEnvoy® SecureAccess and SecurICE two-factor authentication. These extensive security features ensure that businesses can protect their data effectively while optimizing their operational processes, making it a comprehensive choice for modern organizations. Additionally, the solution empowers teams to remain agile and responsive in a fast-paced market, ensuring they can adapt swiftly to any changes or challenges that may arise. -
34
ecotime
Huntington Business Systems
Streamline workforce management with adaptability and seamless integration.Ecotime® flawlessly merges with existing payroll and human resources systems, while also supporting active directory, LDAP, and a variety of third-party single-sign-on applications. Created by HBS, the Ecotime® solution is recognized for its impressive strength and flexibility in workforce management. By combining proven industry standards with innovative technologies, Ecotime® guarantees exceptional performance. This system is designed to be fully scalable, making it suitable for businesses with as few as 39 employees to large corporations with up to 250,000 staff members, ensuring it can grow in tandem with your organization’s requirements and is already implemented in many different industries. Moreover, Ecotime® grants all employees the freedom to select the most appropriate method for recording their time, tailored to their specific work situations. This level of adaptability is a significant aspect that improves both user satisfaction and operational effectiveness, ultimately contributing to a more streamlined workflow for all. Additionally, the ease of use inherent in Ecotime® further encourages employee engagement and accountability in time management. -
35
CallBroker Report View
DAFQUEST
Elevate your communication insights with seamless reporting solutions.CALLBROKER Report View is a robust server-based application designed to assist communications administrators or managers in analyzing and comprehending their organization's call flow dynamics. Specifically created to improve the overall experience for users of Cisco Unified Communications, this reporting tool imposes no limitations on the quantity of IP phones or calls, equipping communications managers with essential resources to quickly assess and make informed choices about organizational communications. With its user-friendly web-based interface, CALLBROKER Report View offers comprehensive oversight of both internal and external call traffic. Its design is particularly beneficial for call centers, as it provides valuable insights into agent performance, queue statistics, and a wide range of data that supports any customer relationship management system, including details on answered calls, abandoned calls, talk times, waiting periods, and average wait durations. In addition, it integrates effortlessly with Cisco CUCM via AXL or LDAP, and includes features like email notifications and the ability to export reports in PDF and Excel formats, thus enhancing operational efficiency and aiding in better decision-making processes. The extensive analysis and adaptability offered by CALLBROKER Report View render it an essential tool for organizations aiming to refine their communication strategies, making it indispensable for continuous improvement in service delivery and customer satisfaction. Organizations that leverage this tool can expect to see significant enhancements in their overall communication effectiveness and operational workflow. -
36
SecureIdentity MFA
SecurEnvoy
Enhance security effortlessly with flexible Multi-Factor Authentication.Relying solely on a basic username and password combination falls short in safeguarding sensitive information for your business. If login credentials are compromised, your confidential data can be exposed within minutes, leaving you at risk. SecureIdentity offers insights into each user's identity, device, and data, enabling you to monitor actions consistently. Implementing Multi-Factor Authentication (MFA) is a superior choice for enhancing privacy and providing multiple layers of data security. Our MFA solution integrates smoothly with Microsoft's Active Directory as well as other LDAP systems, allowing you to leverage your existing authentication database without the need to redesign or manage a separate user base. We advocate for user flexibility, allowing individuals to select any device as their authentication token, whether it be a smartphone, tablet, laptop, or desk phone, ensuring convenience and security in one package. This adaptability not only increases user satisfaction but also strengthens the overall security posture of your organization. -
37
S-Filer Portal
OKIOK Data
Securely transfer, store, and share files with confidence.The S-Filer Portal™ presents a thorough on-premises solution specifically designed to meet the secure file transfer, storage, and sharing requirements of organizations of all sizes. This platform includes functionalities usually found in more expensive Managed Secure File Transfer (MFT) and Enterprise File Sharing and Synchronization (EFSS) systems. It is purpose-built for enterprise use, offering superior security and manageability compared to typical personal file-sharing services. Files are kept safe in encrypted virtual vaults that use AES 256 encryption, while secure transfers are conducted through SSL/TLS protocols, with the option for end-to-end encryption. Moreover, the platform features seamless integration with Active Directory and LDAP, facilitating Single Sign-On for internal users, and manages external user authentication within separate domains. The robust architecture of the S-Filer Portal empowers organizations to effectively and securely fulfill their file transfer and sharing needs, fostering greater confidence in their data management practices. Ultimately, this solution stands out as a reliable choice for businesses aiming to enhance their security protocols while maintaining ease of use.