AD Bridge logo
0(0 reviews)
Software Status:Active

About AD Bridge

AD Bridge is a identity management software from BeyondTrust that helps organizations integrate Active Directory with various systems. It provides user provisioning, authentication, and single sign-on so IT teams can manage access across diverse environments. This solution simplifies user management processes while ensuring security compliance. AD Bridge allows organizations to maintain control over user identities and access rights across multiple platforms. Key capabilities: user provisioning authentication single sign-on multi-factor authentication access monitoring Best for: IT administrators that need to manage user identities and permissions across various systems efficiently.

AD Bridge Details

Vendor
BeyondTrust
Year Launched
1985
Location
Corporate Headquarters 11695 Johns Creek Pkwy, Johns Creek, Georgia 30097, US
Deployment
cloud
Training Options
Countries Served
All Countries
Languages
Arabic, Chinese, English, French, German, Japanese, Korean, Portuguese, Russian, Spanish, Turkish
Users
IT Managers, System Administrators, Security Analysts
Industries Served
Banking, Financial Services, Insurance, Education, Healthcare, IT Services, Government, Energy, Telecommunications, Manufacturing, Retail
Tags
Authentication, Privileged Access Management, AD Bridge, Centrify

AD Bridge's In-App Market Place

Does AD Bridge have an in-app market place?

Yes

How many Mini-Apps in the marketplace?

1

Mini Apps

N/A

Pricing Options

Free trial
Free version
Request a quote
Promo Offer

Accepted Payment Currencies

USD ($), EUR (€), GBP (£), JPY (¥), AUD (A$), CAD (C$), CHF (CHF), CNY (¥), SEK (kr), NOK (kr), DKK (kr), KRW (₩), INR (₹), RUB (₽)

Pros & Cons

  • Comprehensive PAM Solution: Offers a wide range of features to protect privileged access, including password management, session recording, and privileged session management.
  • Advanced Threat Detection: Employs advanced threat detection and response capabilities to identify and mitigate potential security risks.
  • Robust Security Controls: Provides granular control over privileged access, reducing the risk of unauthorized access and data breaches.
  • Complexity: Implementing and managing a comprehensive PAM solution can be complex, especially for large organizations.
  • Vendor Lock-in: Reliance on BeyondTrust can limit flexibility and increase costs in the long term.

AD Bridge's Support Options

AD Bridge's Alternatives