- Solutions
Identity and Access Management
STREAMLINE ACTIVE DIRECTORY MANAGEMENT, AUDITING & REPORTING
Easily manage, secure, report, and audit your Active Directory. Simplify routine AD management operations such as bulk user provisioning, AD reporting, AD clean-ups with a just a few clicks.
OFFICE 365 MANAGEMENT, AUDITING & REPORTING
Manage, report, and secure your Office 365 services. Easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Office 365 services all from one consol.
AUTOMATE REPETITIVE IDENTITY ACCESS MANAGEMENT OPERATIONS
Automate user provisioning and de-provisioning and customise workflows with review-approve framework to keep control over the automation of crucial tasks.
Related Products
ADSelfService Plus
ADSelfService Plus is an integrated self-service Active Directory password management and single sign-on solution. Inarguably the industry’s most feature-rich solution, ADSelfService Plus supports both on-premises Active Directory and cloud applications for password management.
Related Resources
The imperative need for automation in Active Directory management
In the rapidly evolving landscape of IT management, organisations are continually faced with the challenge of efficiently managing their Active Directory (AD) environments. Active Directory plays a pivotal role in controlling access to critical resources,...
The ultimate guide to identity management automation
Active Directory (AD) is a service that allows organisations to connect users, resources, and data. With it, administrators can easily manage multiple user accounts and devices within the organisational network. AD helps centralise resources and...
Strengthening IoT security: A unified approach to Password Management and Cloud Security
Author: Georgina van den Heever, Content Marketing Coordinator, ITR Technology The proliferation of Internet of Things (IoT) devices has brought unparalleled convenience to our lives, but it has also opened up new avenues for cyber...
Key Manager Plus’ feature highlights from 2023
Though years may pass, one thing that never changes is our commitment towards providing hassle-free certificate life cycle management for every enterprise. To stay true to this goal, over the years, our team has constantly...
A 7-step strategic roadmap to ensure maximum Exchange security
A new set of security vulnerabilities have surfaced with the increased adoption of remote work. This has led to a surge in the number of IT and email-based attacks. Data theft and hacking techniques are...
5 limitations of Windows auditing tools and how you can overcome them
Auditing is essential for addressing security, operational, and compliance needs in a Windows Server environment. However, the built-in Microsoft Windows security auditing tools have certain limitations. These include the requirement for specialised knowledge, processes that consume...
ADManager Plus: The Best Active Directory Management Tool for South African Businesses
ADManager Plus: Active Directory (AD) is a critical part of the IT infrastructure for many businesses in South Africa. It stores important information about users, computers and groups, and it is used to control access...
How ADSelfService Plus Can Benefit Many South African Businesses
ADSelfService Plus: In today’s digital age, businesses of all sizes are increasingly reliant on technology. This reliance on technology means that businesses need to have strong security measures in place to protect their data and...
The future of password(less) authentication
With World Password Day behind us, let’s recap on one of the hottest topics at the moment: the evolution of passwordless authentication. Passwords have been the first line of defence against cyberattacks and essentially, our...
Password attacks: How to combat them
Password attacks: This identity security week, it’s important to understand the importance of passwords in cybersecurity, how easily they can be compromised if you are not careful, and how ManageEngine ADSelfService Plus helps fortify your passwords and...
Ensuring identity security: How to improve the employee experience
Ensuring identity security: Employees in the post-lockdown world have bid goodbye to traditional work environments. Remote and hybrid work is the new normal, with employees expecting full access to their work resources even when working...
Corporate account takeover: How not to become a victim 101
Account takeover is an attack where cybercriminals take ownership of user accounts using stolen credentials. It is essentially an identity theft fraud where the hacker, who now has full control over the user’s account, performs...
Identity security: A Zero Trust approach
Zero Trust is the term for an evolving set of cybersecurity paradigms that moves an organisation’s defensive measures from static, network-based perimeters to instead focus on users, assets, and resources. It is a security mindset...
Cyber insurance readiness checklist
Cyberattacks have always been a known hazard to everyone, and organisations worldwide keep upgrading their security measures in order to survive new-age attacks. Purchasing cyber insurance basically helps cover businesses’ liability for most data breaches...
IAM Metrics: 6 tenets for a successful IAM program
Identifying metrics to track your identity and access management (IAM) program isn’t always straightforward. In this guide, you’ll learn: Why defining objectives and identifying relevant metrics is crucial right at the planning stage.
The transition of wars from battlefield to cyberspace
Modern warfare is no longer confined to the geographic boundaries of the battlefield. War now extends to new terrains, with opponents behind screens, rather than confronting enemy troops head-on. With rapid digitization and the advent...
Kerberos and Active Directory
If you have been researching Active Directory (AD), chances are that you will come across the concept of Kerberos for user authentication and other service request-related functionalities. It is worthwhile to examine the Kerberos protocol in depth and, in...
Implementing contextual awareness to render dynamic security decisions
The widespread adoption of hybrid workplace models and trends, such as BYOD, inadvertently result in an increasingly complex threat landscape that introduces new challenges each day. Conventional security systems are no longer adequate to tackle these...
How we make ADSelfService Plus more secure for you
Security experts around the world are talking about the importance of improving security measures to keep networks safe—and for good reason. We have plenty of examples of how relentless threat actors can be, and we’ve...
IT security hardening at healthcare organisations
In this e-book, we build a framework for comprehensive security. You will also access a 1-page strategy plan to improve the security posture of your organisation.
Data privacy regulations and their impact: An overview
For a long time, companies have been collecting data from their customers without their complete knowledge and consent. Since the true purpose of such data collection is kept hidden from consumers and tucked deep inside...
5 ways to mitigate the rising threat of identity sprawl
Despite growing awareness of the need to advance beyond perimeter-based security, many organisations attempt a piecemeal approach to security. But this leads to an unprecedented proliferation of digital identities, paving the way for security loopholes...
SASE: Securing the cloud network architecture
This whitepaper focuses on how SASE integrates multiple independent network security solutions on a single, cloud-based platform. It also outlines the role of Zero Trust as one of the core building blocks of SASE and...
Future trends in identity and access management (IAM)
This white paper explores the Gartner predictions and other IAM trends to help IT leaders gain insight into the technologies that shape the future of IAM solutions. It provides an overview of IAM principles, tools,...
14 AD auditing mistakes to watch out for
Learn about the most common mistakes made while auditing your Active Directory (AD) environment by downloading this e-book. Gain critical insights on how to avoid making these mistakes to ensure holistic security and system integrity...
What is shadow IT? | Risks and mitigation
What is shadow IT? Shadow IT refers to the use of any application, device, or cloud service in an organisation without explicit approval from the IT department. This usually happens when employees find more efficient...
Secure IoT for a safer cyberspace: The challenges and solutions
The idea of connectivity is not just limited to computers, it has also extended to the appliances we use in day-to-day life. By contributing to a smarter workplace environment, the need for IoT-based systems has...
Implementing endpoint and network security for a hybrid workforce model
The onslaught of the COVID-19 pandemic brought about many changes and disruptions in cybersecurity. Organisations globally shifted to remote work scenarios to enable their employees to work from the comfort of their homes.
Developing a risk-based approach to cybersecurity in the hybrid workforce model
The hybrid workforce model is a novel workplace trend that provides employees the freedom to work from their homes while occasionally reporting to their offices. At the onset of the COVID-19 pandemic, organisations all over...
Looking back at the ADSelfService Plus features and enhancements from 2021
The new year has arrived, and recapping the features and enhancements ADSelfService Plus realised in 2021 is fitting. The integrated self-service password management and multi-factor authentication (MFA) solution for Active Directory and cloud applications added...
ADAudit Plus’ year in review
2021 was a feature-packed year for ADAudit Plus. Having rolled out an array of new auditing capabilities, features, and enhancements, ADAudit Plus has continued to make it easier for you to gain visibility and control over...
Your insider’s guide to why passwords are here to stay
With the proliferation of the Internet of Things (IoT), we’re going to see exponential growth in the use of passwords over the next few years. This e-book explains why passwords are far from dying out...
Reducing account compromises by 99.9 percent using MFA
Passwords, the most common authentication mechanism in use, have been around since the 1960s. While passwords remain popular, they simply aren’t enough to keep an organisation secure in today’s world. This is where multi-factor authentication...
Ransomware: How attackers weaponize Active Directory, and what defence measures can stop them
Ransomware 2.0 not only encrypts the sensitive data in machines but also steals credentials so they can be sold on the dark web or used to launch more disastrous attacks. Therefore, almost all ransomware techniques...
5 ways to measure the effectiveness of your AD backup and recovery solution
Active Directory disasters come in many forms. Therefore, it’s imperative you have a disaster recovery plan ready. Choosing the right backup solution is the first step in the disaster recovery plan. Do you have a...
What causes repeated account lockouts and how to resolve them
A stringent account lockout policy is vital to derail password guessing and brute-force attacks but it also runs the risk of locking out legitimate users costing businesses valuable time, money, and effort.
5 ADSelfService Plus success stories
ADSelfService Plus is a web-based self-service application that allows end users to perform tasks like password reset, account unlock and profile information update, without depending on help desks.
Strategic roadmap to ensure Exchange security
A new set of security vulnerabilities have surfaced with the increased adoption of remote work. This has led to a surge in the number of IT and email-based attacks. Data theft and hacking techniques are...
Why Zero Trust in IAM is the new way forward
The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe.
Free Active Directory management tools: Part 5 – Replication, domain controller roles, and monitoring
Replicate information between domain controllers (DCs), identify the roles assigned to the domain controllers in your Active Directory (AD) environment, and monitor your domain controllers based on the parameters you require with the following free...
Free Active Directory management tools: Part 4 – Terminal Session Manager and Last Logon Finder
When your machine throws a “the server has exceeded the maximum number of allowed connections” message or when user accounts go stale, it is up to the IT administrators to handle it.
Free Active Directory management tools: Part 3 – Generating CSVs and querying Active Directory
Creating a CSV file containing all the required attributes of your entire workforce to perform bulk actions is not only time consuming, but often error-prone.
Free Active Directory management tools: Part 2 – Migrate mailbox data with ease
Have you ever wondered how organisations migrate inboxes, contacts, and calendars into new Microsoft 365 user accounts? Often, a PST migration tool is used to carry out this migration.
Free Active Directory management tools: Part 1 – Managing passwords
Passwords are the first line of cyberdefense, and an organisation cannot afford to have weak passwords, poorly-configured password policies, or even worse, empty passwords. Discovering users with weak or empty passwords can be like finding...
Windows logon auditing: Everything you need to know in only 10 minutes
User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as: Detecting suspicious activities like a high volume of logon failures. Tracking the active and idle time spent by...
Tried and tested best practices for Active Directory security
Recovering from an Active Directory security compromise is not just difficult, but also costly. In this free e-book, we’ll use practical use cases to explain where an organisation may slip up and identify eight tried-and-tested...
5 pain points in Active Directory user account management and how to overcome them
Active Directory (AD) is a crucial identity and access management (IAM) component for many enterprises as it enables the creation, maintenance, and use of digital identities. User accounts in AD are the basis of authentication...
3 simple ways to drastically reduce Active Directory administration costs
Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more diverse than ever. Increasing cloud adoption coupled with remote work...
Meet the expectations of the digital age citizen with help desk software for Government organizations
Deliver a robust and contemporary service experience to both employees and citizens. The commercial sector’s high level of customer service has raised the service expectations of the public. The generally quick and efficient response to...
Breach notification requirements of POPIA: The importance of SIEM
A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification of security compromises—unauthorized exposures of personal data—to the authorities and the data subjects in concern.
The LLMNR/NBT-NS strike explained
Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when the DNS name resolution, which is the conventional method, fails...
How to mitigate password security risks associated with remote work
Remote work is here to stay, at least for the time being. IT admins now face the stiff challenge of extending IT support to employees and ensuring smooth workflows. They are now forced to minimize...
How to choose the right compliance management software for your business
While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency in disclosures from...
Streamlining Threat detection through user behaviour analytics
When it comes to protecting against insider attacks, the real challenge is timely detection and prevention. In a constantly evolving threat landscape, there is only little that traditional security tools can do. AI-enabled solutions can...
NIST password policy recommendations and how they compare with current password practices
The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and is now part of the United States Department of Commerce. The NIST publishes standards across fields including engineering, information technology, neutron...
Why automation is the best thing for compliance reporting
Regardless of the compliance requirement that you are trying to fulfill, the current methods for generating reports are inefficient, ineffective, and fail to truly provide information that can ensure network security.
IT management solutions for government
IT management challenges faced by government
Government departments face numerous IT challenges that threaten to diminish, if not derail their IT-driven services and are increasingly charged with daunting tasks such as:
Smart IT management to keep your financial company in the black
As technological advancements change the way you do business, it is important that you can count on your IT to keep everything up and running. ManageEngine solutions give you complete visibility of your IT infrastructure,...
Monitor, manage, and secure Office 365 remotely
Businesses around the world have been forced to adopt remote working policies in response to the COVID-19 outbreak. In just two months, a vast number of employees around the world shifted to a work-from-home environment.
The IT Professional Remote Working Challenge
#RemoteWorkingChallenge We can only imagine that the increase in remote working has posed challenges for you the IT professional. From dispersed end users to security vulnerabilities and more, it cannot be easy. We would like...
Manage Active Directory from ServiceDesk Plus? Now you can!
Why don’t help desk applications manage Active Directory (AD)? Given the wide array of features that ITSM tools natively offer, it seems like AD management should be packaged into them too.
IT Management Solutions for Educational Institutions in South Africa
Technology can transform education, but your IT must be able to keep up. Any threat, security breach, network congestion, downtime, or drop in user experience can throw your class into chaos.
Strengthen your IT to manufacture at maximum efficiency – IT management solutions for the manufacturing industry
Technology has come a long way in terms of manufacturing, by automizing some aspects of the manufacturing process, the turn-around time for completed elements are quicker and more streamlined.
Password sync in hybrid Active Directory
On any given day, employees’ toggle between multiple business-critical applications, both on-premises and cloud-based, requiring them to remember different passwords. This often leads to password fatigue and, subsequently, a surge in password-related help desk calls.
AD360 – an integrated solution for Active Directory and Exchange Management.
Efficient management of Active Directory and Exchange setup is crucial to the smooth functioning of an organization using Windows. Today’s Identity and Access management (IAM) needs of an organization pose a serious challenge to the...
Use a hybrid Exchange environment? Exchange Reporter Plus has got your back!
Cloud technology is becoming important for most companies, sometimes with entire businesses being run on the cloud. And let’s face it—the cloud has obvious advantages over on-premises options, such as increased reliability, reduced downtime and...
Secure your Office 365 with these 5 features
Office 365’s native tools aren’t perfect, meaning that certain implementations can prove difficult without additional assistance.
An admin’s guide to boosting your Office 365 Secure Score
Your Office 365 Secure Score indicates how secure your current Office 365 environment is compared to the highest possible level of security. If your score isn’t as high as you’d like it to be, there...
How machine learning can help secure your business
With machine learning, your security team won’t have to spend hours poring over unbelievably huge amounts of data generated by your environment.
Use change monitoring, and never let a change go unnoticed in Active Directory
Active Directory relies on services distributed across many, interdependent devices in different locations. To ensure consistent security throughout such a large environment, monitoring changes is essential.
Why password blacklisting is so important, and how to do it in Active Directory
Passwords are still the most popular authentication method used to grant users access to critical business resources. This is problematic because many experts no longer consider passwords a secure form of authentication.
What’s POPIA and how can it affect your IT?
South Africa’s Protection of Personal Information Act (POPIA), much like the EU’s General Data Protection Regulation (GDPR), outlines the policies and procedures South African organizations need to adopt to collect, process, and store personal information.
Best practices for Active Directory backup and recovery
It’s easy to make Active Directory (AD) administrators uncomfortable. Just ask them about their disaster recovery plan. When faced with this question, most AD administrators will only tell you about their object recovery plan. Only a few are better prepared and have a recovery plan for...
Interested in a demo?
Complete your details below to book a demonstration of this product. Or for a quote…