
ManageEngine Expands Its Integration Network With 100+ Prebuilt Integrations for Enterprise Identity Management
By Editor_wr Last updated Mar 26, 2025
Dubai, UAE — March 25, 2025 — ManageEngine, a division of Zoho Corporation and a leading provider of enterprise IT management solutions, today announced that AD360, its identity and access management (IAM) platform, is further expanding its integration offerings, by adding over 100 new prebuilt integrations. This expansion is a decisive step in the company's endeavor to strengthen its converged IAM platform capabilities. In addition to the extension of support to popular HRMS, ITSM, SIEM, and other enterprise applications, AD360 also comes with REST API capabilities for custom integration with third-party and in-house applications.
Why This Matters: The Enterprise Perspective
Large enterprises today face a major challenge: managing various tools with widespread, fragmented data. In a press release titled 'Gartner Identifies the Top Cybersecurity Trends for 2025' (issued March 3, 2025), Gartner® highlights a common challenge for large enterprises: the need to optimize their cybersecurity toolsets for efficiency and security while balancing selections for an average of 45 cybersecurity tools available from over 3,000 vendors. Although enterprises often operate in multi-vendor IT environments out of necessity, this is an added complexity that leads to fragmented identities, resulting in delays in access and increased IT overhead. For example, Gartner's 2024 IAM Leadership Survey found that 54% organizations have seen an increase in the number of identity-related breaches, with one in three organizations experiencing increased business interruptions, financial loss or regulatory penalties from such incidents. As many as 85% of identity-related breaches can be attributed to hacked machine identities such as service and automation accounts. Additionally, according to Verizon's 2024 Data Breach Investigations Report, around 31% of all breaches since 2013 involve stolen credentials.
With global compliance laws and regulations requiring organizations to maintain accurate and up-to-date identity and access data at all times, keeping these records updated is critical. Seamless integration of identities is no longer just an IT challenge for enterprises; it's a business imperative.
'Our vision is to eliminate identity fragmentation and radically simplify enterprise identity governance,' said Manikandan Thangaraj, vice president at ManageEngine. 'With AD360's expanded integrations, we're empowering businesses to build truly unified digital ecosystems. With this release, we want to help our customers transform identity management from an operational burden into a strategic enabler of productivity, agility, and security. Now, a hospital can auto-provision clinician access in Epic EHR the same day they're hired in Workday, with no coding and no delays.'
Enabling Business Agility with Seamless Integrations
ManageEngine AD360's integrations leverage industry-standard protocols—including SCIM, SAML 2.0, OpenID Connect (OIDC), OAuth 2.0, and REST APIs—ensuring seamless compatibility across diverse IT ecosystems. Through an intuitive no-code configuration interface, IT teams can effortlessly establish connections and design automated workflows without specialized programming knowledge, dramatically accelerating implementation timelines from months to mere days.
ManageEngine's extensive integration network for identity access management enables:
? Accelerated Value Realization: Enterprises can quickly integrate and automate identity workflows, reducing operational costs, minimizing errors, and enhancing productivity through unified life cycle management and real-time identity synchronization.
? Strategic Flexibility and Choice: Maintain the freedom to integrate with a vast range of enterprise applications without vendor lock-ins, ensuring compatibility, scalability, and support for diverse business needs.
? Advanced Identity Automation: With businesses seeking productivity improvements, AD360 can implement sophisticated, no-code identity orchestration processes to automate critical activities such as user provisioning, access modifications, identity synchronization, and secure offboarding across a company's identity ecosystem.
? Zero-Gap Compliance: Automatically align identity records across HR, IT, and security systems to pass audits for the GDPR, HIPAA, and SOX.
'The interoperability between critical business applications streamlines processes such as onboarding and offboarding, delivering measurable business value and accelerating ROI. Legacy IAM tools often treat integrations as an afterthought, requiring months to integrate an organization's IAM tech stack with ITSM or HCM tools. AD360 helps accomplish this with just a few clicks. It's not just about connecting systems, it's about fundamentally changing how enterprises manage identities while minimizing security risks,' Thangaraj stated.
Next Post
Nando's UAE, Dubai Autism Center Launch Ramadan Art Initiative
Comments are closed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Channel Post MEA
5 days ago
- Channel Post MEA
Organizations Leveraging Existing Data Management Platforms To Develop GenAI AppS
Gartner predicts that organizations will develop 80% of Generative AI (GenAI) business applications on their existing data management platforms by 2028. This approach will reduce the complexity and time required to deliver these applications by 50%. During the Gartner Data & Analytics Summit taking place in Mumbai this week, Prasad Pore, Sr Director Analyst at Gartner, said, 'Building GenAI business applications today involves integrating large language models (LLMs) with an organization's internal data and adopting rapidly evolving technologies like vector search, metadata management, prompt design and embedding. However, without a unified management approach, adopting these scattered technologies leads to longer delivery times and potential sunk costs for organizations.' As organizations aim to develop GenAI-centric solutions, data management platforms must evolve to integrate new capabilities or services for GenAI development, ensuring AI readiness and successful implementation. Enhancing GenAI Application Deployment With RAG Retrieval-augmented generation (RAG) is becoming a cornerstone for deploying GenAI applications, providing implementation flexibility, enhanced explainability and composability with LLMs. By integrating data from both traditional and non-traditional sources as context, RAG enriches the LLM to support downstream GenAI systems. 'Most LLMs are trained on publicly available data and are not highly effective on their own at solving specific business challenges,' said Pore. 'However, when these LLMs are combined with business-owned datasets using the RAG architectural pattern, their accuracy is significantly enhanced. Semantics, particularly metadata, play a crucial role in this process. Data catalogs can help capture this semantic information, enriching knowledge bases and ensuring the right context and traceability for data used in RAG solutions.' To effectively navigate the complexities of GenAI application deployment, enterprises should consider these key recommendations: Evolve Data Management Platforms: Evaluate whether current data management platforms can be transformed into a RAG-as-a-service platform, replacing stand-alone document/data stores as the knowledge source for business GenAI applications. Evaluate whether current data management platforms can be transformed into a RAG-as-a-service platform, replacing stand-alone document/data stores as the knowledge source for business GenAI applications. Prioritize RAG Technologies: Evaluate and integrate RAG technologies such as vector search, graph and chunking, from existing data management solutions or their ecosystem partners when building GenAI applications. These options are more resilient to technological disruptions and compatible with organizational data. Evaluate and integrate RAG technologies such as vector search, graph and chunking, from existing data management solutions or their ecosystem partners when building GenAI applications. These options are more resilient to technological disruptions and compatible with organizational data. Leverage Metadata for Protection: Enterprises should leverage not only technical metadata, but also operational metadata generated at runtime in data management platforms. This approach helps protect GenAI applications from malicious use, privacy issues and intellectual property leaks. 0 0


Web Release
5 days ago
- Web Release
SentinelOne Recognized as a 2025 Gartner Peer Insights Customers' Choice for XDR
SentinelOne, a global leader in AI-powered security, announced that it has been named a Customers' Choice in the 2025 Gartner Peer Insights 'Voice of the Customer' for Extended Detection and Response (XDR) report – one of only two companies with this distinction. It's the latest recognition as a Customers' Choice for SentinelOne which recently was positioned as a Customers' Choice for Cloud-Native Application Protection Platforms (CNAPP) and Managed Detection and Response (MDR) use cases. 144 users provided reviews of the Singularity Platform, and 97% said they would recommend the solution to respond to threats across endpoints with AI-powered security, and 97% rated the solution four stars or better. 'With the growing complexity of cyber threats, organizations need more than siloed security—they need AI-powered, autonomous protection that delivers real-time detection and response across their entire attack surface. Customers have made it clear that SentinelOne's XDR provides the intelligence, automation, and efficiency they need to stay ahead of threats and secure their environments with confidence,' said Ely Kahn, Vice President, Product Management, SentinelOne. Extending AI-Powered Security from Endpoint to XDR Gartner defines 'Extended detection and response (XDR) products deliver security incident detection and automated response capabilities for security infrastructure. XDR integrates threat intelligence and telemetry data from multiple sources with security analytics to provide contextualization and correlation of security alerts.' SentinelOne's AI-powered XDR solution empowers customers to detect, investigate, and respond to threats with unparalleled speed and accuracy. By integrating threat intelligence and telemetry from endpoints, identities, networks, cloud environments, and beyond, this XDR solution provides security teams with deep contextualization and automated response capabilities, all within a unified platform. What Customers are Saying 'As a cybersecurity analyst, I have been using SentinelOne alongside my team for the last six months. Compared to the previous EDR we used, this is a much appreciated upgrade. SentinelOne is faster, has many more features and analytical capabilities than our previous EDR and has a seamless experience,' said a Cyber Analyst for a Banking Company. A Software Engineer at a Consumer Goods Company, agrees, 'A robust and intelligent cybersecurity platform with top notch XDR and endpoint protection. SentinelOne's response to real time threats is incredible. It provides high performance and minimum latency with offline protection as an extra advantage.' Recognition as a Gartner Peer Insights Customers' Choice comes on the heels of SentinelOne being named to CRN's 2025 Security 100 List in the Endpoint and Managed Security category for the eighth consecutive year and achieved 100% in the Detection category in the 2024 MITRE ATT&CK Evaluations: Enterprise. SentinelOne was also named a CRN 2024 Product of the Year. To learn more about the award-winning solution and the transformation it is driving, click here.


Channel Post MEA
29-05-2025
- Channel Post MEA
Cisco Launches Duo Identity & Access Management
Cisco has unveiled Duo Identity and Access Management (IAM), a new security solution that transforms how organizations combat persistent identity-based attacks that are accelerating in the AI era. Identity is a prime target for bad actors, accounting for 60% of Cisco Talos Incident Response cases in 2024, because current solutions have critical weaknesses that attackers exploit. Duo IAM offers an innovative and security-first approach, with added protection built on its globally trusted multifactor authentication (MFA). Duo IAM is the latest advancement in Cisco's long-standing commitment to user-friendly Zero Trust security. 'The security industry is facing an 'identity crisis' as persistent identity-based attacks are among the most dangerous and costly challenges for security teams. Attackers don't need to hack in, when they can simply log in,' said Jeetu Patel, President and Chief Product Officer, Cisco. 'While identity is the foundation of strong security, traditional IAM solutions have failed to prioritize security despite increasingly sophisticated threats. With this massive innovation, Duo is moving beyond MFA and restoring trust in identity security with a fundamentally different approach that attackers hate and users love.' Purpose-built to protect against modern identity threats, Duo IAM enables organizations to securely manage their entire identity infrastructure. Duo includes a new User Directory to simplify storing user identities – including usernames, emails, and roles – and managing their access to resources. Paired with its existing capabilities including MFA and Single Sign On (SSO) to provide users with simple, easy and secure access to hundreds of applications from one login page, Duo now offers customers a comprehensive IAM solution. Open and flexible, Duo IAM also integrates effortlessly with existing third-party identity systems. The new Identity Routing Engine allows Duo to integrate with many identity providers either as an identity broker or as a secondary identity provider. Incorporating security by default, Duo IAM frustrates attackers, while improving user experience and management costs. The Cisco AI Assistant is embedded in Duo to help organizations easily deploy and manage the new solution out-of-the-box. Duo IAM offers comprehensive protection against phishing attacks. Recent innovations strengthening end-to-end phishing resistance include: Complete Passwordless : New option ensures a secure authentication experience without users ever having to use or remember a password. : New option ensures a secure authentication experience without users ever having to use or remember a password. Proximity Verification : This capability uses Bluetooth Low Energy (BLE) to ensure a user's mobile and access devices are near each other when authenticating. : This capability uses Bluetooth Low Energy (BLE) to ensure a user's mobile and access devices are near each other when authenticating. Session Theft Protection: New enhancements to Duo Passport remove the reliance on browser cookies from authentication, protecting against session theft and hijacking. Identity infrastructure is complex and often disconnected, creating blind spots where attacks and vulnerabilities go unnoticed. To help organizations continuously monitor and respond to changes in identity risk, Duo IAM integrates with Cisco Identity Intelligence, connecting identity and access data across the Cisco Security Cloud platform. With AI-driven behavioral analytics and Cisco's unmatched reach into the network, organizations gain comprehensive visibility, threat detection, and the ability to take graduated responses like quarantining an identity, killing active sessions or isolating the network. 'Identity breaches are no longer the exception—they're the rule. Seeing a trusted security brand like Duo broaden from access management to include identity management and provide a security-first approach in the market is both timely and refreshing,' said Todd Thiemann, Principal Analyst, Enterprise Strategy Group. 'Duo's commitment to maximizing security while minimizing user and admin friction is exactly what the industry needs. In particular, their approach to end-to-end phishing resistance marks a major leap forward, not just in security, but also in ease of deployment, to combat the latest identity threats.' 0 0