5 Integrations with Enzoic for Active Directory

View a list of Enzoic for Active Directory integrations and software that integrates with Enzoic for Active Directory below. Compare the best Enzoic for Active Directory integrations as well as features, ratings, user reviews, and pricing of software that integrates with Enzoic for Active Directory. Here are the current Enzoic for Active Directory integrations in 2025:

  • 1
    Microsoft Azure
    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 2
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 3
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 4
    AWS Marketplace
    AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs.
  • 5
    Enzoic Account Takeover Protection
    Protect your users and business with seamless Account Takeover (ATO) prevention. Enzoic’s REST API integrates effortlessly into your login, account setup, and password reset workflows, providing real-time detection of compromised credentials from third-party breaches. This allows you to take immediate action, like requiring a password reset or enabling step-up authentication, to keep accounts secure. With Enzoic, you gain the benefits of proactive protection without disrupting the user experience. Our solution reduces fraud and unauthorized access by using a constantly updated database of billions of compromised credentials. Whether the threat is from a recent breach or an older one, Enzoic identifies unsafe credentials and neutralizes risks. Designed for flexibility and ease of use, Enzoic empowers your organization to stay ahead of account takeover threats while maintaining smooth operations.
    Starting Price: $0
  • Previous
  • You're on page 1
  • Next