What Integrates with AD Enterprise?
Find out what AD Enterprise integrations exist in 2026. Learn what software and services currently integrate with AD Enterprise, and sort them by reviews, cost, features, and more. Below is a list of products that AD Enterprise currently integrates with:
-
1
Microsoft 365 is a comprehensive productivity suite that brings together essential tools like Word, Excel, PowerPoint, Outlook, and Teams in a unified cloud-based environment. Enhanced by Microsoft 365 Copilot, the platform integrates AI directly into these applications to help users work more efficiently and intelligently. Users can quickly generate documents, analyze complex datasets, and design presentations with the help of AI-driven suggestions and automation. The platform supports real-time collaboration, allowing teams to work together on files, share updates, and communicate seamlessly. With OneDrive cloud storage, users can securely store and access their files from any device at any time. Microsoft 365 also enables users to incorporate their own files into AI prompts, ensuring responses are relevant and context-aware. Copilot can assist with brainstorming ideas, summarizing content, and organizing workflows to save time. The platform is accessible across desktop, web, and mobile applications, providing flexibility for different work environments. It also prioritizes user control, giving individuals the ability to manage how AI is used within their workspace. By combining productivity tools with intelligent automation, Microsoft 365 helps users accomplish tasks faster and more effectively. Ultimately, it empowers individuals and teams to improve productivity, collaboration, and decision-making in a modern digital workspace.
-
2
Microsoft Teams
Microsoft
$12.50 per user per month 187 RatingsToday's intricate business challenges require collaborative efforts from dedicated teams. To assist you and your team in mastering the art of effective collaboration, we have developed a comprehensive online guide. When you establish a collaborative environment for discussion and decision-making, the potential for success expands exponentially. Microsoft Teams consolidates all necessary resources into a unified workspace, allowing seamless communication through chat, virtual meetings, file sharing, and integration with various business applications. Enhance your team's synchronization with features like group chat, online meetings, calling, and web conferencing. Engage in collaborative document editing using integrated Microsoft 365 (formerly Office 365) tools such as Word, Excel, PowerPoint, and SharePoint. You can also incorporate your preferred Microsoft applications and third-party services to facilitate continuous business progress. Teams offers robust end-to-end security, comprehensive administrative control, and ensures compliance—all backed by Microsoft 365’s capabilities. Designed to accommodate various types of groups, Teams provides a free version with no commitments, as well as an option to access it within a superior suite of productivity tools. Embrace the power of teamwork and unlock new opportunities for innovation and growth. -
3
Microsoft OneDrive
Microsoft
$2 per user per month 74 RatingsAccess, share, and collaborate on your files from virtually anywhere with ease. OneDrive seamlessly connects you to all your documents within Office 365, allowing for effortless sharing and teamwork, while safeguarding your projects. You can quickly store, access, and search through both personal and shared files, including those in Microsoft Teams, on any device you choose. Any changes made while offline will be automatically synchronized the next time you go online. Enhance your productivity by collaborating efficiently with colleagues, whether they are inside or outside your organization. You can securely share files and engage in real-time collaboration using Word, Excel, and PowerPoint across web browsers, mobile devices, and desktops. With the OneDrive mobile application, you can create, view, edit, and share documents on the go. Additionally, it allows you to easily capture whiteboards and scan various paper documents like receipts and business cards for safekeeping. OneDrive also prioritizes the protection of your files, offering simple recovery options for accidental deletions or security breaches, while enabling administrators to enforce security protocols to ensure your data remains secure. By using OneDrive, you not only streamline your workflow but also enhance the safety of your information. -
4
Google Drive
Google
Free 24 RatingsAccess, share, and store your files effortlessly across any device. Enjoy the initial 15 GB of storage at no cost. With Drive Enterprise, companies are billed solely for the actual storage their employees consume. It includes Google Docs, Sheets, and Slides, ensuring compatibility with Microsoft Office for a smooth experience. Preserve your photos, stories, designs, recordings, videos, and much more. The first 15 GB of storage is complimentary with a Google Account. Files stored in Drive can be accessed from any smartphone, tablet, or computer, allowing your documents to accompany you wherever you venture. You can easily invite others to view, download, and collaborate on your files—all without the hassle of email attachments. Begin your journey with Drive for free today and experience the convenience of cloud storage. -
5
Gmail
Google
$0 19 RatingsMaximize your productivity with Gmail, which has been enhanced to be more secure, intelligent, and user-friendly—allowing you to efficiently manage your inbox and save valuable time. Easily spot new features and prioritize your reading and responses with convenience. Receive gentle reminders to follow up and reply, ensuring that you never miss an important communication. You can check attachments, respond to invitations, postpone messages, and perform various tasks without needing to open every email. With a powerful filter in place, Gmail prevents 99.9% of harmful emails from reaching your inbox, and you’ll be alerted if anything appears suspicious. This makes your email experience not only safer but also more streamlined than ever before. -
6
Microsoft SharePoint empowers organizations to securely create, manage, and share content across teams with built-in AI intelligence and collaboration tools. It serves as a central hub for communication, document management, and process automation—enhanced by Copilot for rapid site creation and SharePoint agents that answer questions, summarize data, and provide actionable insights. Users can easily design modern intranet sites using templates, flexible layouts, and drag-and-drop elements tailored to their brand identity. With advanced management controls, IT administrators maintain strict data governance, identity management, and compliance across departments. Integrated with Teams, OneDrive, Outlook, and Power BI, SharePoint ensures a connected workflow where content and people align effortlessly. Its AI-driven knowledge discovery transforms passive files into searchable, intelligent resources that drive decision-making. The platform also supports immersive media, dynamic dashboards, and multilingual content to enhance internal communication. Whether for small businesses or global enterprises, SharePoint is the foundation for a unified, secure, and AI-ready digital workplace.
-
7
AWS is the leading provider of cloud computing, delivering over 200 fully featured services to organizations worldwide. Its offerings cover everything from infrastructure—such as compute, storage, and networking—to advanced technologies like artificial intelligence, machine learning, and agentic AI. Businesses use AWS to modernize legacy systems, run high-performance workloads, and build scalable, secure applications. Core services like Amazon EC2, Amazon S3, and Amazon DynamoDB provide foundational capabilities, while advanced solutions like SageMaker and AWS Transform enable AI-driven transformation. The platform is supported by a global infrastructure that includes 38 regions, 120 availability zones, and 400+ edge locations, ensuring low latency and high reliability. AWS integrates with leading enterprise tools, developer SDKs, and partner ecosystems, giving teams the flexibility to adopt cloud at their own pace. Its training and certification programs help individuals and companies grow cloud expertise with industry-recognized credentials. With its unmatched breadth, depth, and proven track record, AWS empowers organizations to innovate and compete in the digital-first economy.
-
8
Microsoft Exchange
Microsoft
6 RatingsEnhance your productivity with a business-class email and calendaring solution. With Exchange, you can effectively collaborate on essential documents while enjoying a streamlined inbox that highlights significant messages and adjusts to your individual work habits, allowing you to accomplish tasks more efficiently. Benefit from a customized inbox filled with useful features, along with a more structured method for managing and engaging with your emails. Enhanced search functions deliver quicker and more comprehensive results, and the inclusion of Add-ins provides powerful customization options that link you to contemporary services and internal business applications. Additionally, optimize your schedule with a sophisticated calendaring system that surpasses mere appointment setting, automatically capturing details from emails like flight confirmations and hotel bookings, and offering venue suggestions based on your current location. Microsoft Exchange Online serves as a robust hosted email platform designed for businesses, ensuring the protection of your data through advanced security measures. With these tools combined, you can streamline your workflow and empower your team to work more innovatively. -
9
Microsoft Defender Antivirus
Microsoft
2 RatingsMicrosoft Defender, part of the Microsoft 365 security ecosystem, offers powerful yet simple protection for your digital life. It unifies identity, data, and device protection across all your personal and family devices, keeping you one step ahead of hackers and scammers. Defender scans the dark web for signs of compromised personal information and notifies you instantly if any risk is detected. With identity theft monitoring, credit tracking, and 24/7 restoration support, it helps minimize damage and recover stolen identities. The app’s coverage includes up to $1 million in identity restoration-related fees and $100,000 in lost funds protection. Families can monitor 60+ data types per member, ensuring broad coverage for adults and children alike. Defender’s cross-platform compatibility ensures consistent protection on Windows, Mac, iPhone, and Android, along with an intuitive web portal for managing alerts. Backed by Microsoft’s security intelligence, it integrates seamlessly with OneDrive and other 365 apps for end-to-end online safety. -
10
Check Point CloudGuard
Check Point Software Technologies
1 RatingThe Check Point CloudGuard platform delivers comprehensive cloud-native security, ensuring advanced threat prevention for all your assets and workloads within public, private, hybrid, or multi-cloud settings, effectively unifying security measures for automation across the board. With its Prevention First Email Security, users can thwart zero-day attacks and stay one step ahead of cybercriminals by harnessing unmatched global threat intelligence and employing a robust, layered email security framework. The platform enables quick and seamless deployment through an invisible inline API-based prevention system, tailored to match the pace of your business operations. Additionally, it offers a unified solution for cloud email and office suites, providing detailed insights and transparent reporting via a single dashboard, along with a consolidated license fee that covers all mailboxes and enterprise applications. In essence, Check Point CloudGuard ensures that organizations can manage their security posture effectively while benefiting from a streamlined approach to safeguarding their cloud environments. As businesses expand their digital footprint, such solutions become increasingly vital for maintaining security and operational efficiency. -
11
Jamf Now
Jamf
$2.00/month/ user Jamf Now, previously Bushel, offers an on-demand mobile device management solution that is specifically designed for iPhones, iPads and Macs in the office. This device management platform is fast, easy to use, and affordable. It allows Apple users to easily set up, manage, protect, and secure their workplace. Jamf Now allows you to easily set up company email accounts, protect sensitive information, and automatically install apps for work. -
12
Intelligent Management Center
Hewlett Packard Enterprise
$2000.00/one-time Aruba AirWave stands out as the sole multi-vendor solution for managing both wired and wireless networks, specifically tailored for mobile devices, users, and applications. By continuously assessing the health and performance of all connected entities, AirWave equips IT departments with essential insights to enhance the modern digital workplace. As the intricacies of network management escalate, so too do the dangers linked to compromised data flows. HPE Intelligent Management Center (IMC) provides extensive oversight across campus cores and data center networks, transforming irrelevant network data into valuable insights that keep both your network and business thriving. HPE's network and service management offerings facilitate telco networks from the core to the edge, empowering operators to capitalize on the opportunities presented by 5G technology. Additionally, they streamline the management of data centers and Fibre Channel (FC) storage area network (SAN) infrastructures, while the HPE IMC Branch Intelligent Management System enables remote oversight of Customer Premises Equipment (CPE). This comprehensive approach ensures that businesses can maintain efficient and secure network operations in an increasingly digital landscape. -
13
Brainspace
Reveal
Brainspace stands as the most sophisticated and all-encompassing data analytics platform tailored for investigations, eDiscovery, intelligence extraction, and regulatory compliance. With our patented technology, you can significantly speed up the identification of crucial information. By utilizing the power of the leading solution in Augmented Intelligence, organizations can swiftly uncover valuable data insights while simultaneously minimizing their legal vulnerabilities. Below is a concise summary of Brainspace's essential features. Our platform showcases the pinnacle of Unsupervised Machine Learning, with an interactive clustering visualization that facilitates the exploration of topics of interest, no matter the data volume. It effectively illustrates entire communication networks, enabling users to swiftly pinpoint individuals of interest and delve into associated people and discussions. Each component of the dashboard is interactive, allowing for a more focused analysis, and ultimately enhancing the user experience. In addition, this innovative approach ensures that you have the tools needed to make informed decisions quickly. -
14
Azure Firewall
Microsoft
Azure Firewall serves as a cloud-managed network security solution designed to safeguard your Azure Virtual Network assets. This service operates as a fully stateful firewall, ensuring both high availability and scalable performance in the cloud environment. It is a comprehensive network security tool that not only protects your resources but also allows for the creation, enforcement, and logging of connectivity policies across various subscriptions and virtual networks. With its robust features, you can streamline the deployment and management of network security, taking advantage of the firewall's scalability and availability. Additionally, it enables centralized management of security settings across multiple virtual networks, employing a unified set of application and network rules for enhanced protection. This makes it easier for organizations to maintain consistent security postures as they expand their cloud infrastructure. -
15
Relativity
Relativity
RelativityOne is a comprehensive AI-driven legal data platform that enables legal teams to efficiently manage, analyze, and act on large and complex datasets. It centralizes all legal data into a single system, allowing users to organize information and uncover insights that are critical for building strong cases. The platform incorporates advanced AI capabilities that help automate time-consuming tasks, improve accuracy, and speed up decision-making processes. It offers a suite of specialized tools designed for specific legal challenges, including document review, privilege protection, and case strategy development. Security is a top priority, with proactive monitoring and advanced safeguards to protect sensitive legal information. RelativityOne also provides robust support and resources, including training, certifications, and a collaborative user community. These features help teams stay informed and continuously improve their workflows. The platform is widely used across industries such as law firms, corporations, and government agencies. It supports a variety of legal use cases, including e-discovery, investigations, and data breach response. By combining AI, security, and collaboration, RelativityOne enhances efficiency and reduces operational complexity. Overall, it enables legal professionals to focus on high-value work while relying on technology to handle the rest. -
16
LTU Visual Search API
LTU Technologies
LTU provides a comprehensive solution for object and image processing that is tailored to meet the unique requirements of your business. Their integrated SaaS platform is both open and configurable, facilitating advanced visual recognition capabilities. This web service encompasses a variety of features, including matching, color palette searches, and an upcoming metadata search. Unlike traditional methods that rely on Deep Learning, LTU's approach utilizes a "unique signature" derived from the visual attributes of images or objects, enabling effective computer vision solutions. Users can take advantage of a wide array of visual search functionalities that are easily accessible through this adaptable web service. Furthermore, LTU's platform integrates proprietary algorithms and can incorporate third-party technologies, ensuring the visual search is specifically customized to suit your particular needs. The solution is also designed to allow for effortless comparison and detection of changes, with a high degree of configurability to align with your specific use case. Overall, LTU’s offering stands out for its ability to provide personalized and effective visual processing solutions. -
17
SecureDoc CloudVM
WinMagic
WinMagic’s SecureDoc CloudVM solution stands out as the most comprehensive option for full disk encryption and sophisticated management of encryption keys tailored for virtual machines. It safeguards data across public, private, and hybrid cloud infrastructures, ensuring that your organization retains exclusive control over volume and full disk encryption keys. With extensive compatibility across various virtualized servers and multiple cloud environments, SecureDoc CloudVM facilitates a cohesive encryption strategy that can be applied seamlessly to any endpoint, whether in a virtualized setting or within a cloud IaaS framework. By offering a unified platform and a centralized view, SecureDoc CloudVM enhances organizational security, guarantees compliance with encryption regulations, simplifies processes, and eliminates encryption silos within the business. Moreover, WinMagic’s SecureDoc provides the benefit of a single, intuitive platform for the intelligent management of encryption and key requirements, empowering you to oversee every facet of your data protection strategy with confidence. This integrated approach not only streamlines security management but also helps in aligning with best practices for data governance. -
18
Trellix Data Encryption
Trellix
Trellix offers Data Encryption solutions that protect devices and removable storage to guarantee that only authorized personnel can access the stored data. You can implement encryption policies from one management dashboard, which also allows for monitoring the encryption status and producing compliance documentation. Select from a wide array of policy choices to safeguard data across various devices, files, and removable media, all efficiently overseen from a single platform. With Trellix Native Drive Encryption, the management of both BitLocker and FileVault is centralized, streamlining operations into one accessible console that can be utilized on-premises or through SaaS. This approach not only conserves time but also optimizes resources for organizations dealing with various operating systems, as tasks such as encryption key and PIN management are consolidated in one place, enhancing overall efficiency. Additionally, this centralized system aids in maintaining a consistent security posture across the organization. -
19
Quin-C
AccessData
AccessData® is transforming the landscape of digital forensics and legal review, enabling you to discover vital evidence more swiftly, establish deeper connections within data, and construct more robust cases. With the innovative Quin-C™, AccessData provides a powerful tool that equips forensic and legal teams of all expertise levels to perform and finalize more precise and advanced investigations than ever before. Quin-C integrates effortlessly with the AccessData solutions you are already familiar with, granting you unparalleled control over the processes of data collection, processing, reviewing, analyzing, and reporting on essential information. Designed to be feature-rich yet user-friendly, Quin-C introduces cutting-edge technology aimed at enhancing the productivity of investigative, forensic, IT, and legal teams alike. When paired with AccessData's core products, Quin-C stands out as the fastest and most scalable solution currently available on the market. This remarkable tool significantly boosts efficiency and throughput, employing next-generation features that not only support ongoing investigations but also pave the way for future inquiries. By leveraging Quin-C, organizations can streamline their workflows and ensure that crucial evidence is not overlooked in critical situations. -
20
AD Lab
AccessData
Utilize AD Lab's divide and conquer approach for efficient data management. This effective solution empowers users to navigate through extensive data sets, accommodate diverse data types, and execute multiple cases simultaneously, all while fostering collaboration in a scalable setting. With its distinct feature of distributed processing, AD Lab allows investigators to harness additional hardware, significantly boosting the speed of case processing and resolution. A one-person lab can greatly enhance its efficiency by leveraging the four-worker distributed processing engines (DPEs) offered by FTK®, while larger labs managing substantial data sets or those collaborating with attorneys, HR, or other stakeholders can elevate their operations by adopting AD Lab. Serving as a centralized investigative platform, AD Lab enhances the experience with robust web-based review features and expanded DPE capabilities, accommodating up to 16 engines with the recent 6.2 release, all supported by a centralized processing farm and database infrastructure. This comprehensive solution positions teams to tackle complex investigations with unparalleled speed and effectiveness. -
21
KLDiscovery
KLDiscovery
KLDiscovery employs a cutting-edge processing application that enhances speed and reliability, elevating your data processing capabilities to unprecedented heights. By leveraging the ability to launch multiple instances of our application simultaneously, we can handle enormous data volumes in a fraction of the time that other solutions require. In fact, it is not uncommon for us to process several terabytes of information within just one week. Our integrated deduplication engine plays a crucial role in minimizing the overall data footprint by efficiently removing duplicate documents through the comparison of custom hash values derived from metadata across as many as fourteen different fields. Every deduplication action is meticulously documented within the extensive reporting features embedded in our application, ensuring that this defensible process is fully tracked, recoverable, and reproducible. This capability to efficiently manage vast amounts of data represents only part of our comprehensive approach to data processing. Additionally, our commitment to innovation ensures that we continually enhance our solutions to meet the evolving needs of our clients. -
22
KLD Analytics
KLDiscovery
Ediscovery has significantly evolved over its brief existence, with KLDiscovery leading the charge in delivering optimal solutions and tools to help clients minimize expenses while quickly accessing pertinent information. They present a comprehensive suite of eDiscovery analytics tools paired with extensive human expertise, ensuring that clients maximize the benefits of their chosen solutions. Failing to implement eDiscovery analytics puts organizations at a heightened risk of incurring higher legal expenses and overlooking essential documents. KLD Analytics, crafted through the collaboration of data scientists, software engineers, and legal experts, stands out as the most sophisticated toolkit available today. It enables users to rank and categorize documents with exceptional precision using machine learning technologies. Furthermore, the system automates the routing and distribution of documents, thereby enhancing the efficiency of the review process. It allows for determining the connections between messages and identifying those that are most comprehensive. By recognizing and clustering similar records, it emphasizes the subtle distinctions, facilitating a quicker review turnaround. Overall, leveraging these advanced analytics can transform the eDiscovery process into a more effective and cost-efficient endeavor. -
23
MOBILedit!
COMPELSON Laboratories
Our goal is to enhance global safety while ensuring that our products contribute effectively to combating crime and terrorism. Compelson's tools can also assist in establishing individuals' innocence. We empower our users to safeguard their privacy by allowing them to investigate the data that their devices store and to verify the effectiveness of the security and encryption within their applications. It’s important to understand the information that may be accessible to others. Our resources facilitate the freedom to choose among various mobile devices, enabling seamless data migration from your existing phone to a new one. With our versatile tool, MOBILedit, we aim to assist you with a wide range of phone-related tasks, including backing up, restoring, mass editing, and recovering deleted data. We invite you to explore how we can support you in uncovering lost information, investigating any hidden data on a device, or transferring all your information from an old phone to a new one. How can we assist you further in your mobile needs?
- Previous
- You're on page 1
- Next