
Active Directory Control Paths is a free Identity Governance and Administration tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Active Directory Control Paths, including their key features and shared capabilities.
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.
Shares 4 capabilities with Active Directory Control Paths: Neo4j, Visualization, Graph, Privilege Escalation
Analyzes identities & entitlements to score risk and surface access insights.
Shares 3 capabilities with Active Directory Control Paths: Attack Paths, Graph, Privilege Escalation
AD permissions audit tool for analyzing ACLs, access rights, and security principals.
Shares 3 capabilities with Active Directory Control Paths: Enumeration, Active Directory, Privilege Escalation
Real-time context engine unifying identity, data, and policy for access control.
Unified AD and Microsoft 365 mgmt, reporting, and automation platform
Integrated IAM suite for Active Directory and hybrid identity management
Automates user/group lifecycle mgmt across directories with delegation & self-service
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.
Analyzes identities & entitlements to score risk and surface access insights.
AD permissions audit tool for analyzing ACLs, access rights, and security principals.
Real-time context engine unifying identity, data, and policy for access control.
Unified AD and Microsoft 365 mgmt, reporting, and automation platform
Integrated IAM suite for Active Directory and hybrid identity management
Automates user/group lifecycle mgmt across directories with delegation & self-service
Identity intelligence platform for visibility & remediation across AD, PAM & data
Identity graph platform for visualizing and managing identity data and access
Identity graph visualization for access visibility and risk analysis
Cloud-based directory service for centralized user, group, and device mgmt.
Automated user access review platform with risk scoring and nested access visibility
Automated user provisioning and self-service IT catalog for identity mgmt.
Service account lifecycle management from discovery to decommissioning
Cloud-based directory platform for identity, access, and device management
Manages AD, Entra ID & M365 with delegation, automation & least privilege
Unified admin console for hybrid AD, Entra ID, Intune, Teams & M365 mgmt.
Cloud-based IAM solution combining access management and governance features
Cloud directory service that syncs users from multiple directory sources
Automates user provisioning, deprovisioning, and lifecycle management.
LDAP proxy firewall for securing Active Directory and LDAP directories
Cloud-hosted virtual directory server for unified identity data access
Identity data synchronization tool for cloud and on-premises systems
AD, Entra ID, Exchange & M365 management with automation & delegation
Automates identity provisioning and synchronization across systems and services.
AI-powered user access review automation for identity governance
Non-human IAM platform for hybrid IT environments with secretless authentication
Identity knowledge graph for access governance and IAM decision-making
AD/Azure AD risk identification and auditing tool for file server environments.
IAM security suite for Office 365, Azure AD/Entra ID & on-prem AD.
Enterprise IAM platform with IGA, PAM, and Zero Trust access controls.
Automates user access provisioning & de-provisioning across apps.
Agentless CIEM tool for managing cloud entitlements & enforcing least privilege.
An automated script that configures Active Directory domains using customizable XML configuration files.
CloudTracker analyzes CloudTrail logs against IAM policies to identify over-privileged AWS users and roles by comparing actual permission usage with granted permissions.
IGA platform automating access certifications, compliance, and identity governance.
Manages AI agent identities and non-human access across cloud and SaaS platforms
Compliance-focused IGA platform for provisioning, SoD analysis, and access reviews
Enterprise IAM platform with zero trust identity fabric capabilities
Identity security platform for human, non-human, and AI agent identities
Identity governance platform for access mgmt, compliance & lifecycle automation
On-premises IGA solution for identity lifecycle and access management
Unified identity platform for IGA, PAM, compliance, and access governance
Unified IAM & PAM platform with identity mgmt, privileged access & password mgmt
Identity management platform for access governance and Zero Trust security
Identity governance and administration solution native to ServiceNow platform
Cloud-based IGA solution for identity lifecycle mgmt and access governance
Common questions security professionals ask when evaluating alternatives and competitors to Active Directory Control Paths.
The most popular alternatives to Active Directory Control Paths include Orca Cloud Infrastructure Entitlement Management, Aaia, Identity Intelligence & Analytics, Active Directory Permissions Analyzer, and IndyKite IndyKite.ai. These Identity Governance and Administration tools offer similar capabilities and are frequently compared by security professionals evaluating their options.