Why AD360
 
Solutions
 
Resources
 
 

Gartner recommendedIAM critical capabilities in AD360

Request a Demo gartner-recommended-iam-capabilities-banner

AD360: solution overview

AD360 is a holistic identity governance, security, and access management solution.From user provisioning, password self-service for end-users, change monitoring, to single sign-on (SSO) for enterprise applications, the solution helps execute your IAM projects with a simple, easy-to-use web interface. Target systems such as Windows Active Directory, Exchange Servers, Office 365 and more can be governed, monitored, audited, and secured with AD360.

15 Gartner recommended IAM critical capabilities in AD360:

  • 1

    Identity lifecycle management & fulfillment

    Streamline identity management of user accounts including those of temporary employees or contractors, using automated user lifecycle management for provisioning, role changes (re-provisioning) and deprovisioning.

    4

    Real-time change auditing

    Get audit reports for privileged user activity, insider threat detection and root cause analysis. Monitor and get notified on logons activity, ACL and password changes. Also, audit Azure AD, removable storage, workstation, server, file & folder. Generate out-of-the box reports for GDPR, SOX, PCI, HIPAA, FISMA, GLBA.

    7

    User Authentication Methods

    Avoid impersonation attacks using biometric, and other advanced authentication methods. Step up your security by implementing MFA to end points and applications.

    10

    Nonstandard Application Enablement

    Supports custom scripts that facilitate identity provisioning for in-house applications. Go beyond mainstream target systems like Active Directory, Azure AD, Office 365 and extend AD360’s IAM capabilities to ServiceNow, Salesforce and other third-party applications.

    13

    Ease of deployment

    No prerequisites or complicated deployment. Start managing identities in your on-premises, cloud, or hybrid IT environment within minutes.

  • 2

    Entitlements management

    Eliminate redundancy and human errors, and improve business processes by automating entitlements management with context-aware privilege delegation.

    5

    Policy and role management

    Supports role-based access control which lets admins define and assign granular roles for stakeholders, enforce policy of least privilege, and segregate duties on privileged accounts to prevent privilege escalation.

    8

    Adaptive authentication

    Risk-based adaptive authentication using factors such as user location, IP address, time of previous logon, device footprint and more.

    11

    Access requests

    Supports self-service group management through which users can request membership to AD groups to gain access to a set of specific IT resources. By enabling approval workflow rules for self-service group management, application and resource owners can control who gets to be a member of a particular group.

    14

    API Target Enablement

    The AD360 REST APIs facilitate sharing of data between AD360 and any third-party application or web service.

  • 3

    Approval-based workflows

    Capability to build purpose-oriented business workflows. Create the required levels of approval—requester, reviewer, approver, and executor— for the right stakeholders.. Define the approval flows for business processes such as user account creation, modification, permissions management and more.

    6

    Access Certification

    Review user access rights using detailed reports and ensure that the access complies with internal security policy.

    9

    SaaS Application Enablement

    Supports SAML 2.0-based SSO to hundreds of enterprise SaaS applications like Salesforce, ServiceNow, Slack, and more.

    12

    Reporting and ML-based user behavior analytics

    Detect, investigate, and mitigate threats such as malicious logins, lateral movement, malware attack, and privilege abuse with machine learning-based User Behavior Analytics; remediate threats with automated response.

    15

    High availability

    It supports high availability in case of system and application failures. High availability is achieved through automatic failover; when the AD360 service running on one machine fails, another instance of the AD360 service running on a different machine will automatically take over.

  • 1

    Identity lifecycle management & fulfillment

    Streamline identity management of user accounts including those of temporary employees or contractors, using automated user lifecycle management for provisioning, role changes (re-provisioning) and deprovisioning.

    2

    Entitlements management

    Eliminate redundancy and human errors, and improve business processes by automating entitlements management with context-aware privilege delegation.

    3

    Approval-based workflows

    Capability to build purpose-oriented business workflows. Create the required levels of approval—requester, reviewer, approver, and executor— for the right stakeholders.. Define the approval flows for business processes such as user account creation, modification, permissions management and more.

    4

    Real-time change auditing

    Get audit reports for privileged user activity, insider threat detection and root cause analysis. Monitor and get notified on logons activity, ACL and password changes. Also, audit Azure AD, removable storage, workstation, server, file & folder. Generate out-of-the box reports for GDPR, SOX, PCI, HIPAA, FISMA, GLBA.

    5

    Policy and role management

    Supports role-based access control which lets admins define and assign granular roles for stakeholders, enforce policy of least privilege, and segregate duties on privileged accounts to prevent privilege escalation.

    6

    Access Certification

    Review user access rights using detailed reports and ensure that the access complies with internal security policy.

    7

    User Authentication Methods

    Avoid impersonation attacks using biometric, and other advanced authentication methods. Step up your security by implementing MFA to end points and applications.

    8

    Adaptive authentication

    Risk-based adaptive authentication using factors such as user location, IP address, time of previous logon, device footprint and more.

    9

    SaaS Application Enablement

    Supports SAML 2.0-based SSO to hundreds of enterprise SaaS applications like Salesforce, ServiceNow, Slack, and more.

    10

    Nonstandard Application Enablement

    Supports custom scripts that facilitate identity provisioning for in-house applications. Go beyond mainstream target systems like Active Directory, Azure AD, Office 365 and extend AD360’s IAM capabilities to ServiceNow, Salesforce and other third-party applications.

    11

    Access requests

    Supports self-service group management through which users can request membership to AD groups to gain access to a set of specific IT resources. By enabling approval workflow rules for self-service group management, application and resource owners can control who gets to be a member of a particular group.

    12

    Reporting and ML-based user behavior analytics

    Detect, investigate, and mitigate threats such as malicious logins, lateral movement, malware attack, and privilege abuse with machine learning-based User Behavior Analytics; remediate threats with automated response.

    13

    Ease of deployment

    No prerequisites or complicated deployment. Start managing identities in your on-premises, cloud, or hybrid IT environment within minutes.

    14

    API Target Enablement

    The AD360 REST APIs facilitate sharing of data between AD360 and any third-party application or web service.

    15

    High availability

    It supports high availability in case of system and application failures. High availability is achieved through automatic failover; when the AD360 service running on one machine fails, another instance of the AD360 service running on a different machine will automatically take over.

360 User provision Beyond native limitations Automated bulk provisioning of users. Automated – Adaptive, Policy based Access Management (APAM). Automated – stale accounts cleanup and license revocation. Flexible policy based MFA Unlimited SSO. Beyond IT department – ticketing like ITSM.
  • 360° user provision 360 User provision
  • Beyond native limitations Beyond native limitations
  • Automated bulk provisioning Automated bulk provisioning of users.
  • Automated APAM Automated – Adaptive, Policy based Access Management (APAM).
  • Stale accounts cleanup Automated – stale accounts cleanup and license revocation.
  • Policy based MFA Flexible policy based MFA
  • Unlimited SSO Unlimited SSO.
  • Ticketing like ITSM Beyond IT department – ticketing like ITSM.
gartner-recommended-iam-capabilities-foot

Get a one-on-one product walk-through

Demo request received

Thank You for the interest in ManageEngine AD360. We have received your personalized demo request and will contact you shortly.

  • Please enter email address
    Please enter business email address
  • Please enter phone number
  • Please choose demo date
  •  
  • By clicking 'Schedule 1:1 Personalized Demo', you agree to processing of personal data according to the Privacy Policy.

Rethink your IAM strategy using AD360

Get started with AD360
 
Chat now
   

Hello!
How can we help you?

I have a sales question  

I need a personalized demo  

I need to talk to someone now  

E-mail our sales team  

Book a meeting  

Chat with sales now  

Back

Book your personalized demo

Thanks for registering, we will get back at you shortly!

Preferred date for demo
  •  
    • Please choose an option.
    • Please choose an option.
  •  
  •  
    This field is required.

    Done

     
  • Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Schedule a demo’, you agree to processing of personal data according to the Privacy Policy.
Back

Book a meeting

Thanks for registering, we will get back at you shortly!

Topic

What would you like to discuss?

  •  
  • Details
  •  
    • Please choose an option.
    • Please choose an option.
    Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Book Meeting’, you agree to processing of personal data according to the Privacy Policy.