Alternatives to Ivanti User Workspace Manager

Compare Ivanti User Workspace Manager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Ivanti User Workspace Manager in 2026. Compare features, ratings, user reviews, pricing, and more from Ivanti User Workspace Manager competitors and alternatives in order to make an informed decision for your business.

  • 1
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
    Leader badge
    Partner badge
    Compare vs. Ivanti User Workspace Manager View Software
    Visit Website
  • 2
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Partner badge
    Compare vs. Ivanti User Workspace Manager View Software
    Visit Website
  • 3
    Securden Endpoint Privilege Manager
    Securden Endpoint Privilege Manager (EPM) helps enterprises remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time basis, eliminating standing privileges while maintaining seamless operations. Enforce application control using allowlisting and blocklisting, enable on-demand and policy-based granular application elevation, and manage privileges even on offline endpoints. Capabilities include JIT local admin rights, application usage tracking, and local administrator group monitoring. Secure remote access supports IT helpdesk operations, while built-in controls help meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. A highly scalable architecture and wide array of integrations make Securden EPM ideal for securing enterprise endpoints at scale.
    Compare vs. Ivanti User Workspace Manager View Software
    Visit Website
  • 4
    Parallels RAS

    Parallels RAS

    Parallels

    Parallels® Remote Application Server (RAS) is a remote work solution that provides secure virtual access to business applications and desktops on any device or OS—from anywhere. The platform offers an agile, cloud-ready foundation and end-to-end security fueled by a centralized management console with granular policies. Companies can leverage on-premises, hybrid, or public cloud deployments and integrate with existing technology like Microsoft Azure and AWS. Parallels RAS aims to give organizations the flexibility, scalability, and IT agility to adapt to changing business needs. Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to product training.
    Starting Price: $120 US/year/concurrent user
  • 5
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 6
    Omnissa Horizon 8
    Elevate the digital workspace experience with the efficient and secure delivery of virtual desktops and apps from on-premises to the cloud. Horizon 8 is a modern platform for secure delivery of virtual desktops and apps across the hybrid cloud, from the market leader in software-defined data center and digital workspaces. By leveraging unique integration with trusted technology, Horizon 8 helps IT efficiently deploy and scale virtual desktops and apps from a single control plane with rapid provisioning, automation, and simplified management to extend the best digital workspace experience to end users. Efficiently manage desktops and apps across private, hybrid and multi-cloud infrastructure using a cloud-based console and SaaS management services. Leverage intrinsic security built into Horizon infrastructure to gain highly secure remote access to corporate resources - providing protection from the device to the data center to the cloud.
  • 7
    Azure Virtual Desktop
    Azure Virtual Desktop (formerly Windows Virtual Desktop) is a comprehensive desktop and app virtualization service running in the cloud. It’s the only virtual desktop infrastructure (VDI) that delivers simplified management, multi-session Windows 10, optimizations for Microsoft 365 Apps for enterprise, and support for Remote Desktop Services (RDS) environments. Deploy and scale your Windows desktops and apps on Azure in minutes, and get built-in security and compliance features. Bring your own device (BYOD) and access your desktop and applications over the internet using an Azure Virtual Desktop client such as Windows, Mac, iOS, Android, or HTML5. Choose the right Azure virtual machine (VM) to optimize performance and leverage the Windows 10 and Windows 11 multi-session advantage on Azure to run multiple concurrent user sessions and save costs.
  • 8
    Citrix DaaS

    Citrix DaaS

    Cloud Software Group

    Enable secure, flexible work with the leader in virtual apps and desktops. Deliver desktop as a service (DaaS) from any cloud or data center. Get started with Citrix DaaS (formerly Citrix Virtual Apps and Desktops service) in minutes to provide a familiar, high-performance digital workspace experience to your users. We’ll manage the infrastructure and security. You focus on your business. Meet the needs of your modern workforce—and keep sensitive data secure. Citrix DaaS lets you provide a secure workspace experience on any device. It’s all the cost benefits of a managed DaaS solution, plus the added advantages of greater IT agility, better corporate security, and more end-user productivity. Keep apps and data protected while fueling employee productivity. Build a better business continuity plan with easy-to-scale workspace solutions. Simplify virtual app and desktop delivery with proven DaaS solutions.
  • 9
    Amazon WorkSpaces
    Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either monthly or hourly, just for the WorkSpaces you launch, which helps you save money when compared to traditional desktops and on-premises VDI solutions. Amazon WorkSpaces helps you eliminate the complexity in managing hardware inventory, OS versions and patches, and Virtual Desktop Infrastructure (VDI), which helps simplify your desktop delivery strategy. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device. Enable contact center agents to work from anywhere with a secure, easy-to-use agent experience. Let contact center agents work from anywhere.
  • 10
    Ivanti Application Control
    Application Control combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via helpdesk systems lighten the load for IT staff while providing users a streamlined experience. With Application Control you can manage user privileges and policy automatically, at a granular level, and allow for optional self-elevation when exceptions occur. Give your users access to what they need quickly, with seamless app access that relies on granular, context-aware policies. Create flexible, preventive policies to help ensure only known and trusted applications can execute on a system. Enable automated requests for emergency privilege elevation or application access via integrated IT helpdesk system​.
  • 11
    Delinea Cloud Suite
    Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions.
  • 12
    AuthLite

    AuthLite

    AuthLite

    AuthLite secures your Windows enterprise network authentication and stays within your budget. Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication. With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it. AuthLite eliminates the "Pass the Hash" (PtH) attack vector against your administrative accounts by limiting the privileges assigned to a user. Require two-factor logon before granting the domain admins group SID. AuthLite works with your existing RDP servers and software. No changes are needed to RDP client machine software or drivers. Even when you are offline, your account logon is still protected with two-factor authentication. AuthLite uses the strong cryptographic HMAC/SHA1 Challenge/response feature of the YubiKey token to support cached/offline logon.
  • 13
    Ivanti Neurons for Zero Trust Access
    Ivanti Neurons for Zero Trust Access empowers organizations with a continuous verification model and least-privilege connectivity, dynamically assessing user identities, device posture, and application sensitivity to enforce granular, context-aware access controls. It continuously evaluates and scores device risk based on running processes and applications, automatically quarantines unpatched or high-risk endpoints, and applies real-time, context-sensitive policies that grant users only the resources they need. A unified client streamlines VPN, software-gateway, and ZTNA management in a single pane, enabling seamless onboarding of employees, contractors, and partners with frictionless access anywhere. Actionable insights include step-up authentication, automated remediation, and comprehensive app-usage tracking, while intelligent risk ratings prioritize potential threats.
  • 14
    LogonBox

    LogonBox

    LogonBox

    Discover the LogonBox Advantage with our innovative solutions for the modern Enterprise. LogonBox is an independent software vendor that develops software to help organizations manage and secure user identities and credentials. LogonBox solutions reduce helpdesk tickets, increase productivity, secure access across heterogeneous enterprises, and protect network resources by extending authentication beyond the password.
  • 15
    Ivanti Security Controls
    Ivanti Security Controls is an automated patch management solution that simplifies security through unified prevention, detection, and response across physical and virtual environments. It automatically discovers vulnerabilities and missing OS or third-party application patches, then deploys updates to servers, workstations, VMs, and templates, online or offline, via agentless patching and remote task scheduling to minimize disruption. Granular privilege management implements just enough and just-in-time administration to remove full admin rights while elevating access temporarily for approved tasks. Dynamic allowlisting enforces preventive policies so only known, trusted applications can execute, supported by a data-gathering mode that monitors application usage to refine controls and eliminate false positives. CVE-to-patch list creation automates grouping of relevant updates from any vulnerability assessment, and REST APIs enable integration and orchestration.
  • 16
    ARCON | Endpoint Privilege Management
    The ARCON | Endpoint Privilege Management solution (EPM) grants endpoint privileges ‘just-in-time’ or ‘on-demand’ and monitors all end users for you. The tool detects insider threats, compromised identities, and other malicious attempts to breach endpoints. It has a powerful User behavior Analytics component that takes note of the normal conduct of end users and identifies atypical behavior profiles and other entities in the network. A single governance framework enables you to blacklist malicious applications, prevent data being copied from devices to removable storage, and offers fine-grained access to all applications with ‘just-in-time’ privilege elevation and demotion capabilities. No matter how many endpoints you have because of WFH and remote access workplaces, secure them all with a single endpoint management tool. Elevate privileges according to your discretion, at your convenience.
  • 17
    Britive

    Britive

    Britive

    Permanent elevated privileges leave you open to increased data loss & account damage due to insider threats & hackers 24/7. Temporarily granting & expiring Just In Time Privileges with Britive instead minimizes the potential blast radius of your privileged human and machine identities. Maintain zero standing privileges (ZSP) across your cloud services, without the hassle of building a DIY cloud PAM solution. Hardcoded API keys and credentials, typically with elevated privileges, are sitting targets for exploits, and there are 20x more machine IDs using them than there are human users. Granting & revoking Just-in-Time (JIT) secrets with Britive can significantly reduce your credential exposure. Eliminate static secrets & maintain zero standing privileges (ZSP) for machine IDs. Most cloud accounts become over-privileged over time. Contractors & employees often maintain access after they leave.
  • 18
    Netwrix Privilege Secure
    Netwrix Privilege Secure is a comprehensive Privileged Access Management (PAM) solution designed to enhance security by eliminating standing privileged accounts and implementing just-in-time access. Creating ephemeral identities that grant the necessary access only when required, reduces the attack surface and prevents lateral movement within the network. The platform offers features such as session monitoring, recording of privileged activities for audit and forensic purposes, and integration with existing vaults through its Bring Your Own Vault (BYOV) connectors. Additionally, it supports multi-factor authentication to validate user identities in line with zero trust principles. Netwrix Privilege Secure is designed for quick deployment, with initial setup achievable in less than 20 minutes and full deployment within a day. It also provides session management tools for monitoring and recording privileged activities, enhancing audit and forensic capabilities.
  • 19
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 20
    Admin By Request

    Admin By Request

    Admin By Request

    With rapid provisioning of Just-In-Time privilege elevation across your entire workforce. On-board and manage workstations and servers via a user-friendly portal. To reveal risky users and assets through thread and behavioral analytics to identify malicious software and prevent data breaches and malware attacks. By elevating applications - not users. Delegate privileges based on the user or groups to save time and monetary resources. Whether a developer in the IT department, a tech newbie in HR, or a third-party consultant needing to service one of your endpoints, there's a method of elevation appropriate for every user. All features come out-of-the-box with Admin By Request and can be tailored to the needs of individual users or groups.
  • 21
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 22
    Cameyo

    Cameyo

    Cameyo

    Cameyo is the secure Virtual Application Delivery (VAD) platform for any Digital Workspace. Cameyo makes it simple, seamless, and secure to deliver Windows and internal web applications to any device from the browser without the need for virtual desktops or VPNs. By enabling organizations to provide their people with secure access to the business-critical apps they need to stay productive from anywhere, Cameyo helps make remote & hybrid work, work. Hundreds of enterprises and organizations utilize Cameyo’s Digital Workspace solution to deliver Windows and internal web applications to hundreds of thousands of users worldwide.
  • 23
    Arnica UnifiedLogon

    Arnica UnifiedLogon

    Arnica Software

    Arnica UnifiedLogon is an identity management system, which provides access control, personalization and configuration services, and allows you to implement single-point user log-on for access to multiple applications. It is a powerful tool for efficient control of granular user access to applications, application resources and functionalities, all managed through a web browser. Arnica UnifiedLogon was designed as an extremely scalable system, and is perfectly suited for management of any number of users - from a dozen of local users at a small organization to thousands of users in a large enterprise, to millions of users at a public web site. Arnica UnifiedLogon provides several ways of maintaining and extending user profile data to a virtually unlimited level of complexity.
  • 24
    Devolutions PAM

    Devolutions PAM

    Devolutions

    Devolutions Privileged Access Manager (PAM) discovers privileged accounts, automates password rotation, approves check-outs, enforces just-in-time (JIT) privilege elevation, and records every session—giving small and midsize businesses (SMBs) enterprise-grade control without enterprise-grade hassle. Bundle PAM with the Privileged Access Management package and it slots straight into Devolutions Hub delivered as SaaS (Software-as-a-Service) or a self-hosted on-premises (on-prem) Devolutions Server, while Remote Desktop Manager provides one-click launches and Gateway supplies secure tunnels. One integrated stack takes you from standing privileges to true zero-standing-privilege—all under a single pane of glass, complete with granular RBAC (Role-Based Access Control) and tamper-proof audit logs.
  • 25
    BeyondTrust Pathfinder
    BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.
  • 26
    Syteca

    Syteca

    Syteca

    Syteca — control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start. The platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process). Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments. Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.
  • 27
    Navisite Managed Virtual Desktops
    With Navisite’s Managed Virtual Desktop Service, you can harness the power of desktop virtualization to provision, scale and manage remote workers without compromising security, compliance or performance. Give your employees access to virtual desktops from home or while traveling, on any device connected to the internet, with tailored services that are designed, optimized, deployed and managed by our team of experts. We offer three Managed Virtual Desktop Service options that let you run your desktops and applications in the following cloud environments: Amazon WorkSpaces, Windows Virtual Desktop on Microsoft Azure, Citrix Virtual Desktops and Hosted Private Desktops with VMware Horizon.
  • 28
    Kerv DaaS
    Kerv DaaS helps you stay ahead with hosted virtual workspaces that are tailored to your business, onboarded with ease and managed efficiently. We make sure your apps and data are always safe and accessible, while you get back to work. With secure internet access from practically any browser-enabled device, you can work effectively in any flexible work environment. Offline mode means there’s no interruption when you’re on the move and without internet access. All IT and data is stored offsite in secure, purpose-built facilities. So, it’s safe from fires and floods. Your people can continue to serve customers even if you have to close your premises and you can free up office space for other uses. Monthly pricing helps you keep an eagle eye on costs, and running your IT systems with Virtual Workspace unlocks more features and greater productivity for less investment.
  • 29
    Symantec PAM
    Privileged accounts provide elevated and unrestricted access to users and systems and are necessary to perform key activities. Privileged accounts provide elevated and unrestricted access to users and systems and are necessary to perform key activities. Unfortunately, they are also one of the most common attack vectors because, when compromised, they enable hackers to access critical systems, steal sensitive data, and deploy malicious code. Today’s privileged access management technologies must not only enable you to create and enforce controls over users and systems that have elevated or “privileged” entitlements, but with the explosion of virtualized and cloud environments, the attack surface and number and types of privileged accounts have increased exponentially.
  • 30
    DesktopReady

    DesktopReady

    Anunta DesktopReady

    The first complete Virtual Desktop solution that provides both automation and services to deliver secure modern workspaces. Office is how you work instead of where you go. All data and applications are in the public cloud. Devices are owned by employees not IT, and computing is consumed on-demand. Desktop as a Service (DaaS) is a virtual desktop deployment model in which the virtual desktop infrastructure (VDI) technology is hosted on the cloud. It includes provisioning, patching and maintenance of the management plane and resources to host workloads. In DaaS, the storage, network resources, and other support infrastructure are hosted in the cloud. Desktop as a Service (DaaS) provides organizations access to enterprise applications and workloads hosted on public or private cloud. The workforce can access their desktops using a web-based browser securely on the device of their choice.
  • 31
    Amazon AppStream
    Amazon AppStream 2.0 is a fully managed non-persistent desktop and application virtualization service that allows your users to securely access the data, applications, and resources they need, anywhere, anytime, from any supported device. With AppStream 2.0, you can easily scale your applications and desktops to any number of users across the globe without acquiring, provisioning, and operating hardware or infrastructure. AppStream 2.0 is built on AWS, so you benefit from a data center and network architecture designed for the most security-sensitive organizations. Each end user has a fluid and responsive experience because your applications run on virtual machines optimized for specific use cases and each streaming sessions automatically adjusts to network conditions. Reducing the risk of company data leaking is critical in a more mobile and remote environment. With AppStream 2.0, applications and data are not stored on users' computers.
  • 32
    Spool

    Spool

    Spool

    From your hub you can access your cloud desktop, build customised workspaces, add contacts to your network, chat and set workspace events. In short, manage your working day from here. Guide, support and help your team and colleagues as you all work together, whether you are in the office or in your home office. Spool is secure, it’s non-invasive and it enables real interactive working on any application on your cloud desktop. Here’s Spool’s extra special ingredient that you won’t find on other platforms – a brand new, powerful cloud desktop. Creating it is super easy. You won’t need any technical knowledge and it doesn’t take longer than a few seconds. It will be fresh out of the ‘virtual’ box, clean and fast, ready for you to customise. On Spool, cloud desktops are accessible from any physical machine, whatever the specification – so you can save on new hardware costs and reduce carbon footprint.
  • 33
    Citrix Workspace

    Citrix Workspace

    Cloud Software Group

    Employee experience is everything—get it right with an intelligent workspace. Power a smarter, more flexible way to work. You hired the best. Let them be their best. Redefine what it means to work better with Citrix Workspace. Increase employee productivity and engagement through simpler IT. Simplify the way you manage and secure apps, devices, users, and networks so you can deliver the best employee experience. Transition employees back to the office seamlessly. Realize the full potential of your cloud strategy. Replace traditional VPNs with a zero trust approach.
  • 34
    Netwrix Privilege Secure for Discovery
    Only Netwrix Privilege Secure for Discovery removes your biggest undiscovered security risk by providing Just-Enough access, Just-in-Time, eliminating standing privilege with continuous scanning and agentless, faultless simplicity, unlike legacy privileged access management (PAM) solutions that leave unprotected attack surfaces and are difficult to deploy. Netwrix Privilege Secure for Discovery ensures privileged access is precisely allocated and continuously inventoried by granting privileged access on a Just-in-Time, Just-Enough basis using two-factor authentication. Netwrix Privilege Secure for Discovery was purpose-built to address this problem, using an identity-enabled response, and be a force multiplier to security programs worldwide. The founding team especially had in mind those looking to secure and enable access to global, distributed and always scaling infrastructure. Netwrix Privilege Secure for Discovery was purpose-built to address this problem and be a force multiplier.
  • 35
    AD Tidy

    AD Tidy

    CJWDEV

    Search your Active Directory domain for user/computer accounts that are no longer in use by filtering based on last logon time, DNS record timestamp, and much more. You can then perform a number of actions on the accounts that were found, such as moving them to another OU, disabling them, setting a random password, removing them from all groups, and much more. Identify and clean up inactive user and computer accounts in your Active Directory domain. Report on both user and computer accounts. Search the entire domain or select a specific OU. Multi-domain friendly, specify any domain and optionally use alternate credentials to connect to it. Get account last logon information from all DCs or select specific DCs (using either lastLogon attribute or lastLogonTimeStamp attribute). Choose to only find accounts that have not logged on for a specified number of days. Confirm whether or not computer accounts are still active by using the Ping test and DNS record timestamp check.
    Starting Price: $99 one-time payment
  • 36
    Liquidware

    Liquidware

    Liquidware

    ProfileUnity provides policy, profile and security management enabling portability across all Windows OS workspaces as well as physical, RDS, virtual and cloud. FlexApp Layering delivers applications instantly at boot, at logon or on-demand with its exclusive PackageOnce, FastPackaging, and Click-to-Layer features. Stratusphere UX provides detailed metrics to support optimum hybrid workspace image and infrastructure design as well as rapid diagnostics and troubleshooting. The newly available Stratusphere Base Integration Kit integrates rich UX data directly into ServiceNow. Working from Home options are more important than ever. Take a 10-step path to a successful launch. Stratusphere UX data with Microsoft PowerBI visualization is a powerful combination. Let Liquidware experts show you how to recover thousands in hardware and software savings, yet improve efficiency.
  • 37
    Shells

    Shells

    Shells

    Shells provides you with a 1-click, powerful virtual desktop environment, driven by a cloud computer, without leaving your browser! It's your personal workspace in the cloud. Shells are virtual desktop cloud computers. Access Shells with any web-enabled device. Shells gives you the cloud for your computer! Shells are Intel powered cloud computers that are always on, just like a desktop computer. Additionally, you’ll never miss anything with push notifications! The one-device-life has arrived! Run full desktop software, including but not limited to desktop grade browsers, desktop grade office applications, and even software development, music and media production applications and much more! Shells lets you run multiple apps at the same time and position them however you want. There are no rules or restrictions here! Run anything you want, anywhere you want, in any way you want!
  • 38
    WALLIX BestSafe

    WALLIX BestSafe

    WALLIX Group

    Eliminate the need for user accounts with elevated permissions thanks to innovative endpoint privilege management. Achieve unparalleled security across all endpoints with permissions controlled at the application and process level – without impacting user productivity. Mitigate the risks of granting administrator privileges without overburdening your IT team. Endpoint Privilege Management applies the Principle of Least Privilege with seamless and granular application-level permissions control while empowering users to work efficiently. Block ransomware, malware, and crypto viruses from entering your network, even when users hold elevated privileges. Control privileges at the application and process-level and stop encryption operations with innovative endpoint protection technology. Enforce least privilege security efficiently, with no impact on user productivity and minimizing the need for IT intervention.
  • 39
    CyberArk Secure Cloud Access
    CyberArk Secure Cloud Access protects cloud identities by managing access securely across multi-cloud environments without compromising user experience. It centralizes control with granular access policies and just-in-time privilege granting, helping reduce risk while maintaining productivity. Designed to integrate seamlessly with existing workflows, it ensures secure and efficient cloud access for developers, engineers, and administrators.
  • 40
    Oriso

    Oriso

    Oriso

    Oriso offers a Canadian-hosted, fully independent cloud platform built for simplicity, transparency, and control, addressing the needs of businesses, MSPs, and developers with Infrastructure as a Service (IaaS), Desktop as a Service (DaaS), Software as a Service (SaaS), and Backup as a Service (BaaS). With its “IC3” Cloud Management Platform, users can create, manage, and scale virtual machines in minutes without support tickets or delays, while enjoying transparent fixed pricing, local 24/7 support, ISO 27001 certification, and end-to-end sovereignty. It empowers organizations to migrate workloads, such as Microsoft 365 or Google Workspace backups, or to deliver their own software as a cloud-based SaaS offering while retaining full control of resources, branding, and tenancy. Its solution set also enables secure data transfers (for example, from Amazon S3 into Oriso’s sovereign Canadian cloud) and provides disaster-recovery, multi-site uptime, and more.
  • 41
    Goliath Performance Monitor

    Goliath Performance Monitor

    Goliath Technologies

    Goliath Performance Monitor with embedded intelligence and automation enables IT professionals to anticipate, troubleshoot, and document end-user experience issues regardless of where IT workloads or users are located. It focuses on the 3 main areas most likely to cause support tickets to be opened, initiating a logon, the logon process, and in-session performance. Our technology is designed to proactively alert you to end-user experience issues before they happen and if they do give you the data to troubleshoot them quickly. Then, provide you the objective evidence in the form of reports and historical metrics so that proof exists to justify fixed actions to prevent future issues. Goliath Performance Monitor provides broad and deep visibility that allows you to troubleshoot VDI environments with the most comprehensive performance data available. Now, support teams and administrators can quickly identify where in the delivery infrastructure a problem is occurring.
  • 42
    Thinfinity DaaS

    Thinfinity DaaS

    Cybele Software

    What is Thinfinity DaaS? Desktop virtualization doesn't have to be a complex process. Thinfinity is the digital transformation ally you need. We collaborate with Independent Software Vendors, Business owners, Managed Service Providers, IT managers, and various other professionals, empowering them with the tools to leverage the cloud and elevate their businesses. Thinfinity offers a fully integrated Desktop-as-a-Service solution (DaaS), prioritizing speed and simplicity— enabling you to work swiftly and flexibly from any location. With Thinfinity, you can also publish any Windows applications, transforming it into a Software as a Service (SaaS), thereby expanding your business possibilities. Experience Thinfinity and discover the simplicity and efficiency of our cloud desktop solution! Cloud-based VDI solutions provide businesses with a wide range of benefits, including enhanced security, increased flexibility, improved collaboration, and lower costs.
  • 43
    CloudKnox

    CloudKnox

    CloudKnox

    Least Privilege Policy Enforcement for AWS, Azure, Google Cloud and VMware. CloudKnox delivers the only platform that enables the continuous creation, monitoring and enforcement of least privilege policies across your cloud infrastructure. Continuous protection of your critical cloud resources from accidents and malicious insiders. Discover Discover who is doing what, when, and where across your cloud infrastructure - in seconds. Manage Give identities “just-enough” and “just-in-time” privileges with the click of a button. Monitor Track user activity patterns and instantly receive detailed reports of anomalies and suspicious behavior. Respond Quickly and easily resolve insider threats across cloud platforms with a comprehensive, unified view of all identities, actions, and resources.
  • 44
    dinWorkspace
    dinWorkspace Hosted Virtual Desktop (HVD) is a cloud computing solution tailored for flexibility, productivity and security. To help you decide whether to go for an HVD, let’s discuss some of its key features and advantages. HVD is just like your regular personal computer but with a difference that all your applications and data are stored at a central server. This may be located within the organization or in the data center of a Cloud Service Provider (CSP) like dinCloud. With HVD, your data and applications move with you. You can use multiple devices such as smartphone, tablet, laptop or desktop to access your apps and data over the HVD. If you have an HVD, you can remain productive even without turning up for work. All your data and applications are accessible from the comfort of your home or while you are on the move.
  • 45
    OpenText NetIQ Privileged Account Manager
    Identify privileged credentials and dependencies across the enterprise to streamline the implementation of privileged account management. Implement security controls that apply policies based on identity attributes to ensure the principle of “least privilege” is being applied. Track and record privileged activity to thwart breaches and support governance and compliance throughout the entire identity lifecycle. Support your Zero Trust strategy with a dynamic, scalable privileged access management solution that automatically adjusts access in real time. In a complex hybrid environment, uncovering every identity with elevated rights can be difficult or nearly impossible. NetIQ Privileged Account Manager enables you to identify which identities have elevated access across your entire environment and what dependencies exist, giving you the insight you need to better simplify, implement, and manage policies around privilege.
  • 46
    Leostream

    Leostream

    Leostream Corporation

    Connect to anything - anywhere, any time, and from any device, quickly and securely. A modern web-based UI is your centralized hub for all your remote resources. Management wants Windows, designers want macOS, and developers want Linux - support multi-OS environments with ease. Leostream works seamlessly with Teradici Cloud Access Software and PCoIP Remote Workstation Cards, providing high-quality graphics for applications running in the datacenter or the cloud. Together, Leostream and Scale Computing offer a complete VDI solution that is simple to set up, easy to manage, and cost-effective for small business. Leostream manages user-to-resource assignments and connections in large-scale enterprise environments from wherever your users roam. Build a VDI or DaaS solution your clients will love with Leostream. Leostream provides all the tools you need to build and deploy a VDI.
    Starting Price: $7.50 per user per month
  • 47
    Bravura Privilege

    Bravura Privilege

    Bravura Security

    Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Bravura Privilege secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster. Bravura Privilege grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premises or in the cloud. Discovers and classifies privileged accounts and security groups. Randomizes passwords and stores them in an encrypted, replicated vault.
  • 48
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 49
    IronOrbit

    IronOrbit

    IronOrbit

    We provide solutions for ALL industries. We make ICT (Information & Communications Technology) simple for whatever it is YOU do. And, we provide ICT products, services, and 24/7 US-based support. Now, more than ever, businesses need easily accessible and dynamic computing, communications, and collaboration capabilities. Put simply, IronOrbit INFINITY Workspaces (hosted desktops, DaaS, VDI), are your computers in the cloud. And they are optimized for what YOU need to accomplish. Your applications, your files, your operating system even your personal desktop shortcuts and settings it’s all there for you. INFINITY Workspaces are faster and more powerful than your laptop or desktop computers and can be accessed securely via any internet-connected device.
  • 50
    Kelltron IAM Suite
    Kelltron’s IAM Suite is an AI-powered identity security platform that unifies Identity & Access Management (IAM), Privileged Access Management (PAM), and Data Governance (DGM) into one seamless solution. It enables secure user provisioning, Single Sign-On (SSO) to 4,000+ apps, adaptive Multi-Factor Authentication (MFA), and role-based access control. PAM features include just-in-time access, session monitoring, and credential vaulting to safeguard privileged accounts. The DGM module helps discover, classify, and enforce data access policies for compliance with GDPR, ISO 27001, and more. Designed for hybrid IT environments, Kelltron offers cloud, on-prem, and multi-tenant deployment. AI-driven automation reduces manual workload by flagging anomalies, suggesting least-privilege access, and generating real-time risk insights. With 24/7 support and a 6-month free trial, Kelltron empowers businesses and MSPs to scale securely with full visibility and control.