Security has always been at the forefront of ManageEngine's priorities. We have taken multiple measures, from employing multi-level security checks during development to third-party penetration testing, to ensure ADSelfService Plus is secure and caters to the security requirements of our customers.
Every step of the development of the solution is subjected to a rigorous testing process by multiple security teams to find security flaws. We make sure to fix any issue reported as soon as possible, whether it is identified by our internal teams, external communities or experts.
The ADSelfService Plus team follows security procedures at every stage of feature development to ensure that the product is secure against cyberattacks.
Besides the ADSelfService Plus security team, there's also a dedicated security team at ManageEngine whose goal is to ensure that all ManageEngine products comply with stringent IT security norms.
ManageEngine also conducts bug bounty programs where individuals or groups from within ManageEngine along with external people, communities, and security experts can notify us if any vulnerability in our solutions has been identified. We immediately begin working on developing and releasing a fix for the vulnerability in such cases.
The ADSelfService Plus team has partnered up with WeSecureApp, an independent application security company, to conduct manual pen tests on ADSelfService Plus, so that we get a third-person perspective on the security footing of the solution. Pen tests are conducted once every quarter. The vendor also conducts these tests yearly on the ADSelfService Plus mobile apps for iOS and Android.
We notify customers about vulnerability fixes in several ways:
Enable context-based MFA with 19 different authentication factors for endpoint and application logins.
Learn moreAllow users to access all enterprise applications with a single, secure authentication flow.
Learn moreEnhance remote work with cached credential updates, secure logins, and mobile password management.
Learn moreEstablish an efficient and secure IT environment through integration with SIEM, ITSM, and IAM tools.
Learn moreDelegate profile updates and group subscriptions to end users and monitor these self-service actions with approval workflows.
Learn moreCreate a Zero Trust environment with advanced identity verification techniques and render your networks impenetrable to threats.
Learn more