Your vote has been recorded.
Stay up-to-date with the upcoming feature announcements and enhancements.
Submit new feature requestsAdopt secure login practices by implementing alternative verification methods that eliminate the need to remember multiple passwords and enable a seamless login experience for users across applications, workstations, servers, and VPNs.
Automate the entire life cycle of identities and repetitive IT administration tasks, such as group management, user access governance, and password resets.
Empower users to complete their onboarding process and manage their accounts independently, reducing the administrative burden by allowing them to securely reset or unlock their accounts, update personal information, and set up their accounts.
Gain a comprehensive view of identity-based threats in your environment based on NIST security framework.
Secure authentication across endpoints without the need for an agent to be installed on all the endpoints to improve deployment time and avoid blind spots.
Integrate with threat intelligence services to detect and block access to malicious IPs.
Build straightforward integrations with third-party applications to facilitate identity management workflows and address complex use cases.
Integrate with Zoho Deluge and Zoho Creator platforms to enable building custom scripts, buttons, widgets, etc., to meet business specific requirements.
UBA-based risk scoring to dynamically control user access based on their historic behavior, enabling step-up authentication.
Monitor help desk requests and admin activities through multi-level approval workflows and condition-based rules, preventing unauthorized IT changes in your organization.
Integration with chatbots to provide instant support, offering know-how guidance, query resolution, and insights.
Prebuilt extensions that can be added to the Identity360 dashboard to gain insights into specific modules quickly.
Visualize attack paths for each privileged object in Active Directory and identify potential vulnerabilities. Calculate the blast radius of an attack to assess its overall impact and get actionable remediation measures to mitigate risks and enhance security.
Connect with third-party applications to deliver payloads, sync data, and carry out specific actions.
Protect access to wifi, remote SSH logins and non-GUI consoles by adding an extra layer of authentication.
Leverage the prebuilt templates based on various industries and use cases to ensure alignment and compliance with industry-specific standards.
Authenticate, authorize, and govern IoT devices to secure communication between devices and cloud apps or APIs and to reduce the risk of IoT-based attacks.
Provide administrators with a unified view of security settings in the product to ensure all critical configurations are set up, enhancing overall identity security.
Allow employees to access organizational resources using their personal devices by enforcing policies and managing access to ensure that security standards are met without compromising user experience.
Enforce time-bound, JIT provisioning, and least privilege access to secure and govern access for third parties such as contractors, vendors, and partners who often require elevated or temporary access to critical systems.
Leverage AI to suggest the most appropriate access rights for users during onboarding or access reviews by analyzing identity, access, and user behavior patterns across the organization.
Control and audit who can access, modify, or delete files and folders across file servers, including Windows, EMC, and Synology file servers within the organization. Ensure only authorized users or groups have the appropriate level of access.
Gain visibility into user and admin activities across apps such as Outlook, SharePoint, Teams, OneDrive, and Exchange through detailed event logs via Microsoft 365 auditing and reporting.
Generate detailed reports on compliance status and frameworks like GDPR, HIPAA, SOX, or PCI-DSS, ensuring that the organization's access control policies and user activities adhere to industry regulations.
Secure OWA logins via authentication methods such as Google Authenticator, email verification, and custom TOTP authenticator.
Integrating Active Directory with Identity360 will enable you to shift your identities to the cloud seamlessly while offering unified user life cycle management, secure authentication, and centralized access management across hybrid infrastructures and multiple enterprise applications.
Have better control over users' access to resources and privileged actions in enterprise applications and machines based on specified conditions such as user roles, device, location, and time.
Manage groups, computers, and mailboxes, in bulk, across their entire life cycle from creation and modification to deletion through intuitive templates in AD and Entra ID.
Grant users temporary, time-limited access to resources. Assigned privileges are automatically revoked after the defined time, reducing the risk associated with standing privileges.
Schedule periodic review and approval of entitlements held by users to mitigate privilege abuse and demonstrate compliance.
Prevent conflict of interest, fraud, and errors by clearly defining roles and responsibilities, preventing employees from receiving permissions beyond their intended role, and job functions.
Define and govern user access rights and permissions to various resources, applications, or data across the organization, adopting the principle of least privilege access.
Securely manage and monitor access to critical systems and data for users with elevated privileges to minimize the risk of privileged accounts abuse.
Evaluate the risk level associated with a specific user in real-time and adjust the authentication requirements based on various contextual factors, such as location, device health, time of access, and behavioral patterns.
Create, modify, and delete Group Policy Objects (GPOs) across multiple domains from a single console, enabling administrators to manage GPOs without utilizing the native Group Policy Management Console (GPMC).
Ensure smooth transition while maintaining security and integrity with minimal downtime when transitioning user accounts, computers, groups, and other directory objects from one domain to another.
Utilize built-in user, group, computer, mailbox, contact, and OU-based reports and generate custom reports that align with unique organizational requirements or target a particular use case by defining specific criteria or filters.
Continuously monitor AD activities to track changes in access attempts and system events and misconfigurations, triggering real-time alerts as soon as suspicious actions are detected.
Harness AI to monitor and analyze user behavior across systems, detect unusual activities, and assign risk scores to trigger alerts for high-risk behavior, helping administrators promptly respond to potential security breaches, insider threats, and compromised accounts.
Identify and assess security vulnerabilities, including misconfigurations, unpatched systems, and excessive access across the organization, while encouraging proactive risk mitigation.
Extends all the capabilities of ADSelfService Plus to Azure AD users, including self-service password reset, adaptive MFA, SSO, password sync, and the Password Policy Enforcer.
This feature will ensure admins have configured all the important security settings in the product through a consolidated view of the security settings.
The Tomcat and PostgreSQL versions used in the product will soon be upgraded to versions 9.0.70 and 14.5 respectively.