Identity and Access Management

Our Active Directory Management solutions offer seamless management, auditing and reporting
solutions for identity and access management in Windows environments.

STREAMLINE ACTIVE DIRECTORY MANAGEMENT, AUDITING & REPORTING

Easily manage, secure, report, and audit your Active Directory. Simplify routine AD management operations such as bulk user provisioning, AD reporting, AD clean-ups with a just a few clicks.

OFFICE 365 MANAGEMENT, AUDITING & REPORTING

Manage, report, and secure your Office 365 services. Easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Office 365 services all from one consol.

AUTOMATE REPETITIVE IDENTITY ACCESS MANAGEMENT OPERATIONS

Automate user provisioning and de-provisioning and customise workflows with review-approve framework to keep control over the automation of crucial tasks.

Related Products

1 - 9 of 9 posts
Manage Engine
Read more

AD360

Products

AD360 is a unified solution for identity and access management (IAM) needs of organizations running on Windows-based infrastructure. AD360 gives you the power to combine any or all of the following five ManageEngine AD Solutions

Manage Engine
Read more

ADAudit Plus

Products

ADAudit Plus is an IT security and compliance solution designed for Windows-based organisations. It provides real time, in-depth knowledge on changes affecting both the content and configuration of Active Directory and servers. Additionally, ADAudit Plus

Manage Engine
Read more

ADManager Plus

Products

ADManager Plus is a simple, easy-to-use Windows Active Directory
Management and Reporting Solution that helps AD Administrators and Help Desk Technicians with their day-to-day activities.

Manage Engine
Read more

ADSelfService Plus

Products

ADSelfService Plus is an integrated self-service Active Directory password management and single sign-on solution. Inarguably the industry’s most feature-rich solution, ADSelfService Plus supports both on-premises Active Directory and cloud applications for password management.

Manage Engine
Read more

Browser Security Plus

Products

Browser Security Plus is an enterprise browser management tool that helps IT administrators manage and secure browsers across networks. It enables them to enforce security policies, control browser extensions and plug-ins, sandbox and lockdown enterprise

Manage Engine
Read more

DataSecurity Plus

Products

DataSecurity Plus is a change monitoring and notification tool for Windows file servers. With the help of lightweight agents, it monitors the files and shares on target systems in real time. It provides real-time reports,

Manage Engine
Read more

Exchange Reporter Plus

Products

Exchange Reporter Plus is an analysis and reporting solution for MS Exchange servers. Combining charts and self-explanatory UI, this software offers valuable stats and analytics required by Exchange administrators to keep their organization’s email infrastructure

Manage Engine
Read more

M365 Manager Plus

Products

M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype

Manage Engine
Read more

RecoveryManager Plus

Products

RecoveryManager Plus is a centralised, web-based tool that simplifies enterprise-level backup and restoration of Active Directory, virtual machines, and Windows servers. It is engineered to take away all the pain involved in one of the

Manage Engine
Read more

SharePoint Manager Plus

Products

SharePoint Manager Plus is a reporting and auditing tool that puts you in control of your SharePoint management and auditing. It allows you to monitor, track and analyze all the activities in your SharePoint infrastructure

Related Resources

1 - 2 of 2 posts
Whitepapers

The ultimate guide to identity management automation

Active Directory (AD) is a service that allows organisations to connect users, resources, and data. With it, administrators can easily manage multiple user accounts and devices within the organisational network. AD helps centralise resources and...

Blog

Key Manager Plus’ feature highlights from 2023

Though years may pass, one thing that never changes is our commitment towards providing hassle-free certificate life cycle management for every enterprise. To stay true to this goal, over the years, our team has constantly...

Blog

The future of password(less) authentication

With World Password Day behind us, let’s recap on one of the hottest topics at the moment: the evolution of passwordless authentication. Passwords have been the first line of defence against cyberattacks and essentially, our...

Blog

Password attacks: How to combat them

Password attacks: This identity security week, it’s important to understand the importance of passwords in cybersecurity, how easily they can be compromised if you are not careful, and how ManageEngine ADSelfService Plus helps fortify your passwords and...

Blog

Identity security: A Zero Trust approach

Zero Trust is the term for an evolving set of cybersecurity paradigms that moves an organisation’s defensive measures from static, network-based perimeters to instead focus on users, assets, and resources. It is a security mindset...

Whitepapers

Cyber insurance readiness checklist

Cyberattacks have always been a known hazard to everyone, and organisations worldwide keep upgrading their security measures in order to survive new-age attacks. Purchasing cyber insurance basically helps cover businesses’ liability for most data breaches...

Whitepapers

IAM Metrics: 6 tenets for a successful IAM program

Identifying metrics to track your identity and access management (IAM) program isn’t always straightforward. In this guide, you’ll learn: Why defining objectives and identifying relevant metrics is crucial right at the planning stage.

Blog

Kerberos and Active Directory

If you have been researching Active Directory (AD), chances are that you will come across the concept of Kerberos for user authentication and other service request-related functionalities. It is worthwhile to examine the Kerberos protocol in depth and, in...

Whitepapers

5 ways to mitigate the rising threat of identity sprawl

Despite growing awareness of the need to advance beyond perimeter-based security, many organisations attempt a piecemeal approach to security. But this leads to an unprecedented proliferation of digital identities, paving the way for security loopholes...

Whitepapers

SASE: Securing the cloud network architecture

This whitepaper focuses on how SASE integrates multiple independent network security solutions on a single, cloud-based platform. It also outlines the role of Zero Trust as one of the core building blocks of SASE and...

Whitepapers

14 AD auditing mistakes to watch out for

Learn about the most common mistakes made while auditing your Active Directory (AD) environment by downloading this e-book. Gain critical insights on how to avoid making these mistakes to ensure holistic security and system integrity...

Blog

What is shadow IT? | Risks and mitigation

What is shadow IT? Shadow IT refers to the use of any application, device, or cloud service in an organisation without explicit approval from the IT department. This usually happens when employees find more efficient...

Blog

ADAudit Plus’ year in review

2021 was a feature-packed year for ADAudit Plus. Having rolled out an array of new auditing capabilities, features, and enhancements, ADAudit Plus has continued to make it easier for you to gain visibility and control over...

Whitepapers

Reducing account compromises by 99.9 percent using MFA

Passwords, the most common authentication mechanism in use, have been around since the 1960s. While passwords remain popular, they simply aren’t enough to keep an organisation secure in today’s world. This is where multi-factor authentication...

Whitepapers

5 ADSelfService Plus success stories

ADSelfService Plus is a web-based self-service application that allows end users to perform tasks like password reset, account unlock and profile information update, without depending on help desks.

Whitepapers

Strategic roadmap to ensure Exchange security

A new set of security vulnerabilities have surfaced with the increased adoption of remote work. This has led to a surge in the number of IT and email-based attacks. Data theft and hacking techniques are...

Blog

Why Zero Trust in IAM is the new way forward

The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe.

Blog

The LLMNR/NBT-NS strike explained

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when the DNS name resolution, which is the conventional method, fails...

Blog

IT management solutions for government

IT management challenges faced by government

Government departments face numerous IT challenges that threaten to diminish, if not derail their IT-driven services and are increasingly charged with daunting tasks such as:

Blog

Monitor, manage, and secure Office 365 remotely

Businesses around the world have been forced to adopt remote working policies in response to the COVID-19 outbreak. In just two months, a vast number of employees around the world shifted to a work-from-home environment.

Blog

The IT Professional Remote Working Challenge

#RemoteWorkingChallenge We can only imagine that the increase in remote working has posed challenges for you the IT professional. From dispersed end users to security vulnerabilities and more, it cannot be easy. We would like...

Blog

Password sync in hybrid Active Directory

On any given day, employees’ toggle between multiple business-critical applications, both on-premises and cloud-based, requiring them to remember different passwords. This often leads to password fatigue and, subsequently, a surge in password-related help desk calls.

Whitepapers

What’s POPIA and how can it affect your IT?

South Africa’s Protection of Personal Information Act (POPIA), much like the EU’s General Data Protection Regulation (GDPR), outlines the policies and procedures South African organizations need to adopt to collect, process, and store personal information.

Blog

Best practices for Active Directory backup and recovery

It’s easy to make Active Directory (AD) administrators uncomfortable. Just ask them about their disaster recovery plan. When faced with this question, most AD administrators will only tell you about their object recovery plan. Only a few are better prepared and have a recovery plan for...

Interested in a demo?

Complete your details below to book a demonstration of this product. Or for a quote…

  • Hidden
  • By sending a request, through this form, I agree that my data may be used according to the terms and conditions of this website.
  • Hidden
  • Hidden
  • Hidden
  • This field is for validation purposes and should be left unchanged.