Alternatives to AD Bridge
Compare AD Bridge alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AD Bridge in 2026. Compare features, ratings, user reviews, pricing, and more from AD Bridge competitors and alternatives in order to make an informed decision for your business.
-
1
BeyondTrust Endpoint Privilege Management
BeyondTrust
Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance. -
2
OSE
Open Seas
Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. Rolling-out & apply the security policy on all Unix, Linux & Windows corporate servers. The Autonomous OSE Agent is permanently located on a Unix/Linux server. It is persistent, even in case of network failure. It can also group a set of servers monitored by OSE Agents. -
3
FreeIPA
FreeIPA
Manage Linux users and client hosts in your realm from one central location with CLI, Web UI or RPC access. Enable Single Sign On authentication for all your systems, services and applications. Define Kerberos authentication and authorization policies for your identities. Control services like DNS, SUDO, SELinux or autofs. Integrated security information management solution combining Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS, Dogtag certificate system, SSSD and others. Built on top of well-known Open Source components and standard protocols. FreeIPA is an integrated security information management solution combining Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS, Dogtag (Certificate System). It consists of a web interface and command-line administration tools. -
4
Univention Corporate Server
Univention
Univention Corporate Server UCS is our open integration platform offering centralized Identity & Access Management (IAM) with Nubus with a web portal. -Portal with Single Sign-On -Integrated IAM -Packaged integrations -App Center with enterprise applications -Active Directory integration -Platform for your entire IT -Operation on-premise, in the cloud, or hybrid The centerpiece of UCS is Nubus, our central IAM solution for managing identities, roles, and groups. The integrated portal with Single Sign-On and self-service functions provides access to all IT services and applications. Thanks to pre-built software and integration packages, apps can be easily put into operation. UCS is ideal for managing distributed, heterogeneous, and virtualized IT environments across Windows, Mac OS, and Linux systems. Find out more about UCS on our website and download the free UCS Core Edition!Starting Price: €25.00 /net per user and year -
5
Delinea Server Suite
Delinea
Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting. -
6
Time Machine
Solution-Soft
Time Machine® provides software virtual clocks that enable you to time travel your applications into the future or the past, facilitating time shift testing on your date and time-sensitive application logic, such as month-end, quarter-end, year-end processing, billing cycle, workflow, regulatory go live and policy life cycle. Time Machine is transparent to applications and databases so no code modification is required to do time shift testing and the system clock is never modified. Time Machine eliminates the need to reset the system clock, which is time-consuming, error-prone, and not possible under Active Directory or in a Kerberos secured environment. Mitigate risks for mission-critical application failures. Ensure large-scale software projects finish on time and under budget. Windows, Linux, Unix, Mainframe zLinux, Dockerized, Virtualized, On-Iron, or in the Cloud. Time Machine runs everywhere you need it. -
7
Sysgem Enterprise Manager
Sysgem
Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM. SEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework. Unite, simplify and integrate core system administration solutions across a multi-platform environment. Unify user account management across a multi-platform, multi-application environment. Manage the controlled distribution and deployment of configuration files across infrastructure.Starting Price: $200 per user per month -
8
OpenText Exceed
OpenText
OpenText™ Exceed™ is a Windows remote access solution for graphically demanding Linux and UNIX software solutions, such as CAD and CAM. Exceed integrates Windows desktop with UNIX, Linux, VMS, X Window System and IBM iSeries and z/OS system environments. A secure, high-performance X Window server, Exceed offers secure and reliable access to X Window applications from Microsoft Windows and Citrix virtual desktops over the LAN. Many engineering, architectural and product design software solutions are implemented on Linux and UNIX, using Linux X Window (X11) graphics technology. A Windows X Server runs these graphical UNIX and X11 applications on Microsoft Windows, rather than costly high-end graphical Linux and UNIX workstations. In order to access the graphically demanding software from Windows, organizations require high performance remote access LAN to LAN software. -
9
TD/OMS
Remain Software
TD/OMS supports IBM i (Power) Windows and Unix/Linux. It incorporates fundamental IT business process support to manage software changes, software development, deployment and modernization projects. TD/OMS enables development teams to work in a collaborative way and to share any information at various development stages in any environment (Development, Test, Acceptance, and Deployment). TD/OMS is a powerful software solution that incorporates all the functionalities to support modern software development requirements. -
10
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
11
Lynis Enterprise
CISOfy
Lynis Enterprise performs security scanning for Linux, macOS, and Unix systems. It helps you discover and solve issues quickly, so you can focus on your business and projects again. It is fairly unique for a company to focus on just a few operating systems. In a field where there are so many services and software solutions, we specialize in Linux and Unix security. The primary focus of Lynis is to perform a health check of systems. It helps also to detect vulnerabilities and configuration management weaknesses. Lynis Enterprise is a software solution to perform security auditing, compliance testing, and apply system hardening. It includes Lynis in the core and focuses on environments with Linux, macOS, or other Unix-based systems.Starting Price: $90 per year -
12
Atlassian Crowd
Atlassian
Single sign-on and user identity that's easy to use. Manage users from multiple directories - Active Directory, LDAP, OpenLDAP or Microsoft Azure AD - and control application authentication permissions in one single location. Make life easy for your users by giving them one username and password to log in to all the applications they need access to. Seamlessly integrate all your Atlassian products - like Jira, Confluence, and Bitbucket- to give your users one simple single sign-on (SSO) experience. Map any combination of directories to a single application – perfect for managing users not in your main directory - and manage authentication permissions in the same place. Get started with connectors for AD, LDAP, Microsoft Azure AD, Novell eDirectory, and more. You can even create your own custom connector. Can't make group changes in your directory? Keep your users in LDAP and define their authentication permissions in Crowd.Starting Price: $10 one-time fee -
13
AWS Directory Service
Amazon
AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft Active Directory (AD), enables your directory-aware workloads and AWS resources to use managed Active Directory (AD) in AWS. AWS Managed Microsoft AD is built on actual Microsoft AD and does not require you to synchronize or replicate data from your existing Active Directory to the cloud. You can use the standard AD administration tools and take advantage of the built-in AD features, such as Group Policy and single sign-on. With AWS Managed Microsoft AD, you can easily join Amazon EC2 and Amazon RDS for SQL Server instances to your domain, and use AWS End User Computing (EUC) services, such as Amazon WorkSpaces, with AD users and groups. AWS Managed Microsoft AD makes it easy to migrate AD-dependent applications and Windows workloads to AWS. With AWS Managed Microsoft AD, you can use Group Policies to manage EC2 instances and run AD-dependent applications in the AWS Cloud.Starting Price: $0.018 -
14
Hypergate Authenticator
Hypergate
Hypergate Authenticator delivers a seamless and secure Single Sign On solution integrating directly with Active Directory. Hypergate Authenticator is a managed application on the mobile device that delivers a seamless and secure Single Sign-On solution integrating directly with your Active Directory. The solution leverages the industry standard Kerberos to provide the best possible user experience without compromising on security. Enable SSO specifically with Android Enterprise which is otherwise not available. Hypergate is fast, not only when interacting with the User, also when implementing it. Enable your Users with Kerberos authentication by simply pushing Hypergate on their device. If there is an issue with the password of the user, this can be varied and changed by them directly on their device, without contacting IT staff for help (SSPR). No dependence on having to use a computer to reset the password. With Hypergate, you can allow staff to become truly mobile. -
15
ZeroTek
ZeroTek
ZeroTek is a multi-tenant IAM SaaS platform purpose-built for managed service providers to deploy, manage, and scale Okta identity services across multiple customers from a single environment. It extends Okta’s enterprise-grade identity and access management capabilities with MSP-specific tooling that simplifies multi-client operations, enabling providers to deliver secure authentication, single sign-on, and lifecycle management as a monthly service. It provides a centralized dashboard that lets teams view and manage multiple customer directories, users, and applications in one place, reducing operational complexity and improving visibility. ZeroTek also enables self-service Okta tenant creation in seconds, allowing faster customer onboarding without lengthy procurement or licensing processes. MSP-focused role-based access control enforces least-privilege permissions for technicians, while comprehensive auditing ensures full accountability across environments. -
16
Check Point Identity Awareness
Check Point Software Technologies
Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console. It is clear that username and passwords no longer prove the identity of a user. Access control to your valuable assets must be strengthened. Check Point Identity Awareness ensures access to your data is granted only to authorized users, and only after their identities have been strictly authenticated; using Single Sign-On, Multi-Factor Authentication, Context-aware policies and anomaly detection. -
17
Visual Guard
Novalys
Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management costStarting Price: 1.55/month/user -
18
Unison File Synchronizer
Unison
Unison is a file-synchronization tool for OSX, Unix, and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating the changes in each replica to the other. Unison runs on both Windows and many flavors of Unix (Solaris, Linux, OS X, etc.) systems. Moreover, Unison works across platforms, allowing you to synchronize a Windows laptop with a Unix server, for example. Unlike a distributed filesystem, Unison is a user-level program: there is no need to modify the kernel or to have superuser privileges on either host. Unison works between any pair of machines connected to the internet, communicating over either a direct socket link or tunneling over an encrypted ssh connection. It is careful with network bandwidth and runs well over slow links such as PPP connections. -
19
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications. -
20
JRiver Media Center
JRiver Media Center
JRiver builds networked media solutions for end users and corporate partners. Products include streaming, downloading, and subscription of audio and video content, unparalleled portable device support, P2P, DLNA, and DRM. JRiver also publishes Windows to Unix/Linux network connectivity software, with over two million users in 50 countries. The company markets its ICE product line through worldwide distribution.Starting Price: $59.98 one-time payment -
21
Google Cloud Identity
Google
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.Starting Price: $6 per user per month -
22
Remedio
Remedio
Remedio is an AI-powered, autonomous device posture management platform that continuously discovers, monitors, and remediates security misconfigurations and configuration drift across enterprise IT and OT environments to reduce attack surface, enforce compliance, and harden endpoint security without disruption. It delivers real-time visibility into configuration risks on devices running Windows, macOS, and Linux, as well as cloud instances and servers, and automatically applies safe remediation actions that are instantly reversible, giving security teams confidence when closing gaps without business impact. Remedio simplifies policy validation and enforcement by benchmarking settings against security standards such as CIS, NIST, and MITRE frameworks and continuously re-applies policies across updates, user changes, and new devices to maintain consistent secure baselines. It provides centralized control and governance of Active Directory, Group Policy, MDM, and Intune settings. -
23
PowerTerm WebConnect HostView
Ericom Software
In today's economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm® WebConnect HostView web-to-host emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Centrally manage configuration and software updates - save on time and administrative resources. Increase productivity; enable anytime, anywhere access to business-critical applications using a standard web browser, regardless of the user's physical location. Reduce costs associated with individual licensing, maintenance, support and updates. SSL, SSH, SFTP, Active Directory and LDAP integration, Single Sign-On, authentication (including Kerberos), RADIUS, RSA® SecurID® and SecurEnvoy® SecureAccess and SecurICE two-factor authentication support, and more. -
24
Hexnode IdP
Hexnode
Hexnode IdP is an identity provider designed to help organizations manage authentication, access control, and identity governance from a centralized platform. It enables IT and security teams to verify user identities and enforce secure access to enterprise applications, devices, and resources. By combining identity verification with real-time device posture evaluation, Hexnode IdP supports a Zero Trust approach to access management. The platform includes capabilities such as single sign-on (SSO), multi-factor authentication (MFA), role-based access control (RBAC), and conditional access policies. These controls allow organizations to ensure that only authorized users on compliant devices can access sensitive systems and data. By centralizing authentication and access policies in a single console, organizations can simplify identity management while improving overall security visibility and control. -
25
Specops Deploy
Specops Software
Specops Deploy simplifies the installation of operating systems, software, and applications in your Microsoft Active Directory environment. Extending the functionality of Group Policy, the solution lets you target any number of computer objects within Active Directory. Use Specops Deploy to save user state during installation, manage local user settings, or capture operating system images. Specops Deploy removes time-consuming manual tasks and improves IT efficiency through a simplified software deployment process. Whether you are installing applications on multiple devices, or upgrading your computers to a new operating system, it is the key to ensuring your time is well spent. Specops Deploy uses existing technologies such as Active Directory, Group Policy, Windows Deployment Services (WDS), Windows Assessment and Deployment Kit (Windows ADK), and Microsoft Deployment Toolkit (MDT). -
26
Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
-
27
BeyondTrust Cloud Privilege Broker
BeyondTrust
Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next. -
28
XplicitTrust Network Access
XplicitTrust
XplicitTrust Network Access is a Zero Trust Network Access (ZTNA) solution that provides secure, seamless access to applications regardless of location for users working from anywhere. It provides identity-based access control that integrates with existing identity providers for single sign-on (SSO) and multi-factor authentication (MFA) using factors such as user identity, device security, location and time. The platform includes real-time network diagnostics and centralized asset management for better oversight. Clients require no configuration and the solution is compatible with platforms including Windows, MacOS and Linux. XplicitTrust uses strong encryption, end-to-end protection, automatic key rotation and context-aware authentication to provide robust security. It also supports scalable application access and secure connections for IoT, legacy applications and remote desktops, making it versatile for today's security needs.Starting Price: $5/month/user -
29
Jubilant Terminal Emulator
Flynet
Jubilant Terminal Emulator provides a browser based, terminal emulator to access key business systems. Access Mainframe, iSeries, Unix, VMS or MultiValue systems, on any device with zero client software. The terminal emulator is installed in a server environment, either on-premise or in the cloud, and centrally managed via the Jubilant administration centre. Jubilant works on all browsers and devices with no Java or ActiveX plugins. Jubilant has all the features you would expect in an enterprise terminal emulator, including client and server-side macro creation, file transfer, single sign-on, MFA and keyboard remapping. -
30
Specops Password Sync
Specops Software
Streamline passwords for users with just one password across multiple business systems. Specops Password Sync instantly synchronizes Active Directory passwords to domains, or other systems. This includes domains in the same forest/other forests, on-premises systems (e.g. Kerberos), and SaaS targets (e.g. O365). The tool enhances security by ensuring that password complexity applies to all systems consistently. Specops Password Sync effectively extends Active Directory password security to other business systems, including external SaaS resources. When combined with a strong password policy, the product ensures that the same level of password complexity applies to all connected systems. Built on Active Directory, the tool captures and synchronizes all changes to a user’s password in accordance with the synchronization rules defined in Group Policy. The solution can be setup in just a few hours by configuring the local Active Directory. -
31
Chef Infra
Progress Software
Chef® Infra® configuration management software eliminates manual efforts and ensures infrastructure remains consistent and compliant over its lifetime — even in the most complex, heterogenous, and large-scale environments. Define configurations and policies as code that are testable, enforceable and can be delivered at scale as part of automated pipelines. Ensure configurations only change if a system diverges from the desired defined state and automatically correct configuration drift, if needed. Manage Windows and Linux systems running on prem, ARM systems running in the cloud or Macs laptops running at the edge all the same way. Use simple declarative definitions for common tasks or easily extend them to support the most unique environmental requirements. Enforce policy by converging the system to the state declared by the various resources. Reduce risks by iterating on policy changes before pushing them to production.Starting Price: $127 per year -
32
Entire Connection
Software AG
Terminal emulation software that connects Windows® users to applications on the mainframe, UNIX®, Linux®, OpenVMS, and BS2000 platforms. Available for Natural on the mainframe. Connect thousands of concurrent Microsoft® Windows® users to applications running on the mainframe, UNIX, Linux, OpenVMS, and BS2000 platforms with highly scalable terminal emulation software, Entire Connection. Protect your application from desktop access by requiring a user ID and password to open a terminal session with Entire Connection. Implement SSO by storing the host user credentials encrypted in the share file and using the Entire Connection script language to log onto the host. -
33
PolicyPak
Netwrix
The PolicyPak Platform gives organizations with different management and security requirements the flexibility to choose an edition right for them. In today's hybrid work environment, users access their desktops at the office, at home, traveling, through a kiosk, and virtually. Managing and securing these environments creates a challenge because not all management systems were designed for modern management scenarios. PolicyPak provides solutions that modernize and extend the power of your existing infrastructure. Using PolicyPak with your Active Directory simplifies how you manage and secure Active Directory joined computers with Microsoft Group Policy. Microsoft Group Policy is a powerful technology you rely upon day after day. But it needs a boost to meet your modern enterprise's management, security, reporting, and automation needs. -
34
Keyfactor Signum
Keyfactor
With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes. Generate and store sensitive private signing keys in a centralized, FIPS 140-2 certified hardware security module (HSM) in the cloud. Define granular access and usage policies for private signing keys, and authenticate users and build servers for signing with a full audit trail. Integrate with platform-native signing tools to protect access to private signing keys, without changing workflows. Integrate with signing tools via lightweight Windows and Linux agents that are quick to install on build servers or developer workstations. Generate key attestation to comply with CA/B forum requirements to verify that keys are stored and generated in an HSM. -
35
OpenText Data Center Automation
OpenText
Automate your service governance processes from end to end with infrastructure patching, continuous compliance management, advanced orchestration, and enterprise-scale provisioning. Run compliance audits across server OS. Visualize the results in a single compliance dashboard and then remediate according to maintenance windows and SLOs. Scan against the latest threats. Prioritize and track top vulnerabilities in a central risk dashboard. Patch according to policies, service level objectives, and maintenance windows. Standardize at build time and then scale. Use policy-aware provisioning and configurations for automated initial enforcement of compliance and patching policies. Get the broadest range of support for multivendor infrastructure. Extend integration to resources deployed by open source configuration tools to centralize compliance and risk management. -
36
JDeveloper
Oracle
Oracle JDeveloper is a free integrated development environment that simplifies the development of Java-based applications addressing every step of the application lifecycle. JDeveloper offers complete end-to-end development for Oracle's platform and Oracle's applications. JDeveloper is a cross-platform IDE that is available in two editions, Oracle JDeveloper Studio with all features and Oracle JDeveloper Java with core Java and XML features. JDeveloper runs on Windows, Linux, Mac OS X, and other UNIX-based systems and is the development platform for the Oracle Fusion Middleware suite of products. Jdeveloper is the main development platform for the Oracle Fusion Middleware suite of products. It is a cross-platform IDE that runs on Windows, Linux, Mac OS X, and other UNIX-based systems. The roles that JDeveloper provides tailor the environment to development needs. The selected role decides which features and options are available for development. -
37
Zoho Directory
Zoho
Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.Starting Price: $1.70/user/month -
38
Primo
Primo
Primo is an all-in-one AI-powered IT operations platform that helps organizations buy, track, secure, and remotely manage company devices and software from a single, centralized system by combining identity, mobile device management (MDM), endpoint detection and response, SaaS management, and global hardware procurement so teams no longer juggle multiple disconnected tools; IT can enforce security policies, push apps and updates, monitor and remediate issues across macOS, Windows, and Linux devices, and coordinate zero-touch deployments at scale, all while keeping identity and access workflows in sync with HR data to automate onboarding, offboarding, and permission changes. It integrates with 60+ HR and email tools to ensure a single source of truth for users and devices, offers real-time compliance and activity logs, supports role-based access and single sign-on, and provides AI-assisted automation to reduce manual work and improve security posture.Starting Price: €8 per month -
39
UserLock
IS Decisions
Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.Starting Price: $2.00/month/user -
40
Print Job Manager
PrinterAdmin Software
Centralized print management solution designed to simplify and automate administration of shared IP, local and Windows server printers. Print Job Manager can can monitor all printing activity, handle charge-backs, control who is printing, how much is being printed and identify the cost of printing across your entire organization. Print Job Manager provides a straightforward software solution for Windows print servers and non-print server printing environment, i.e., direct IP printing or workstation connected printer. This software provides centralized print management capabilities for businesses and educational institutions through advanced print control, print monitor, print counter, print quota, and print audit capabilities. This software can be used with any brand or type of printer making it a global usage software; it also helps to track and control print jobs sent from Windows/Linux/Unix/Mac OS clients and eliminate unnecessary paper wastage.Starting Price: $90 one-time fee -
41
Shell Assistant
Shell Assistant
•SSH and SFTP client •Shell Terminal •SFTP File manager •SFTP code editor •Custom tab & split window layouts •Switch between workspaces •Connection, key & password management •Stream audio and video, view images and pdf's, edit code over SFTP •Tunnel network ports •Text editor-like command editing •Paste history •Free & ad-free •Respects your privacy Connect to remote hosts over SSH, including Amazon Web Service EC2, Linodes, Digital Ocean or Raspberry Pis. Connect to local unix-like installations running Mac OS, Linux, MinGW, Cygwin, Git-bash and Windows Subsystem for Linux. A great tool for your toolbox if you work with Unix, Linux, Mac Command Line, Raspberry Pi's or anything that uses a Command Line Interface. To download the latest version, please visit shellassistant.com.Starting Price: Free -
42
Bash
Bash
Bash is a free software Unix shell and command language. It has become the default login shell for most Linux distributions. In addition to being available on Linux systems, a version of Bash is also available for Windows through the Windows Subsystem for Linux. Bash is the default user shell in Solaris 11 and was the default shell in Apple macOS from version 10.3 until the release of macOS Catalina, which changed the default shell to zsh. Despite this change, Bash remains available as an alternative shell on macOS systems. As a command processor, Bash allows users to enter commands in a text window that are then executed by the system. Bash can also read and execute commands from a file, known as a shell script. It supports a number of features commonly found in Unix shells, including wildcard matching, piping, here documents, command substitution, variables, and control structures for condition testing and iteration. Bash is compliant with the POSIX shell standards.Starting Price: Free -
43
Alibaba Cloud IDaaS
Alibaba Cloud
Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud. -
44
NdSecure
Ndende Technologies
NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthnStarting Price: $8/month/user -
45
Belden Horizon Console
Belden
Belden Horizon is an industrial-grade software suite designed to provide secure remote connectivity, edge orchestration, and operational-technology (OT) data management for factories, plants, and other mission-critical infrastructure. At its core, the Belden Horizon Console enables Secure Remote Access (SRA) and persistent, always-on connectivity (via Persistent Data Network, PDN), allowing technicians or service providers to safely connect to remote machines or networks for troubleshooting, maintenance, or monitoring, without requiring complex IP routing or exposing the broader network. Horizon uses a zero-trust, multilayered security model including token-based two-factor authentication, role-based user and device access, encrypted tunnels, single sign-on (Active Directory), user-configurable password policies, IP allow lists, and a “virtual Lockout-Tagout (vLOTO)” permission system before granting connections to machines. -
46
Supercharger
LOGbinder
LOGbinder Supercharger for Windows Event Collection is a specialized enterprise-grade solution that extends and enhances Microsoft’s native Windows Event Collection (WEC) by providing centralized, policy-based management, high-throughput, reliable agentless log collection, and comprehensive health monitoring from a single dashboard. It wraps the built-in WEC framework with features like automatic detection and remediation of over 50 error conditions, load balancing of thousands of endpoints across multiple collectors, and support for both traditional AD/Group Policy and modern Entra-joined, Intune-managed devices, including remote log collection over the Internet using certificate-based authentication, ensuring continuous, uninterrupted log forwarding regardless of location. Supercharger enables administrators to create and manage advanced event filters, custom logs, collector and subscription policies, and role-based access control, while providing detailed performance metrics. -
47
XyLoc Security Server
Ensure Technologies
The XyLoc® Security Server (XSS) is a server-based software platform, with a web-based GUI, that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. XSS allows IT managers to easily implement and administer XyLoc across multiple network segments and user groups, and also enables detailed reporting and compliance auditing. Simplifies the administration, reporting, and management of XyLoc user environments. Monitors and logs all log-on, secure walk-away, and return (e.g., walk-up recognition) activities. Integrates seamlessly with XyLoc Single Sign-On for full SSO management and activity reporting. Enables fast, secure access to information in a multi-user, shared computer environment (e.g., “Kiosk Accounts”). Provides compliance reporting (e.g., HIPAA) with encrypted user audit logs. Scales easily to support tens of thousands of users. Supports Active Directory® (AD) with a Schema Extension, and SQL Server® environments. -
48
jPDFPrint
Qoppa Software
Print Acrobat PDF documents directly from your Java application or web application, with or without user intervention. jPDFPrint is a Java library that can load and print PDF documents. Simply call the library to send documents to the printer. jPDFPrint is built on top of Qoppa’s proprietary PDF technology so you do not have to install any third party software or drivers. Since it is written in Java, it allows your application to remain platform independent and run on Windows, Linux, Unix (Solaris, HP UX, IBM AIX), Mac OS X and any other platform that supports the Java runtime environment. Features: -Print any PDF documents -Print with or without user intervention (silent print) -Print documents from files, URLs or Java input streams -Support for latest PDF format -Flexible printing options -Runs on Java 6 and above -Works on Windows, Linux, Unix, Mac OS X (100% Java) -No third party software or drivers necessary -
49
Intermedia AppID
Intermedia Cloud Communications
Discover the single sign-on service that's simple for ANY business to deploy. Easy deployment—no infrastructure prerequisites. Enhance security with advanced two-factor authentication, Works with any web app, including custom apps. 99.999% uptime Service Level Agreement. Extend 2FA to any web app. Methods include push notifications, passcodes, text messages or phone calls. 99.999% uptime means less than 30 seconds of monthly unplanned downtime. Eliminate the need for users to hunt for login URLs or remember multiple password. The more web apps you have, the harder it is to ensure security, manage costs and maintain control. This leads to insecure password practices, increased help desk calls, and big security risks. Single sign-on solves the problem of too many apps. Unfortunately, it's always been too hard for smaller businesses to deploy. Now, there's AppID. With no infrastructure prerequisites, our single sign-on service is effortless to deploy.Starting Price: $4 per user per month -
50
DropBear
Matt Johnston
Dropbear is a relatively small SSH server and client. It runs on a variety of Unix platforms. Dropbear is open-source software, distributed under an MIT-style license. Dropbear is particularly useful for "embedded"-type Linux (or other Unix) systems, such as wireless routers. If you want to be notified of new releases, or for general discussion of Dropbear, you can subscribe to the relatively low-volume mailing list. With a small memory footprint suitable for memory-constrained environments, Dropbear can compile to a 110kB statically linked binary with uClibc on x86 (only minimal options selected) Dropbear server implements X11 forwarding and authentication-agent forwarding for OpenSSH clients. The server, client, keygen, and key converter can be compiled into a single binary (like busybox) Features can easily be disabled when compiling to save space. The multi-hop mode uses SSH TCP forwarding to tunnel through multiple SSH hosts in a single command.Starting Price: Free