Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 245 Ratings

Description

Ivanti delivers a suite of integrated IT management products that help organizations automate workflows, enhance security, and improve employee satisfaction. Their Unified Endpoint Management platform offers centralized, easy-to-use controls to manage devices and ensure consistent policy enforcement across any location. Enterprise Service Management provides deeper visibility into IT processes, helping reduce disruptions and increase efficiency. Ivanti’s network security solutions enable secure access from anywhere, while their exposure management tools help identify and prioritize cybersecurity risks. Serving more than 34,000 global customers like GNC Holdings and Weber, Ivanti is committed to supporting modern, flexible workforces. The company also conducts original research on IT trends, cybersecurity, and digital employee experience to guide innovation. Ivanti’s customer advocacy programs highlight the value of strong partnerships and dedicated support. Their offerings empower businesses to manage technology proactively and securely at scale.

Description

Josys is a next-generation Identity Governance and Administration (IGA) solution built to eliminate the manual burden of IT operations. Purpose-built for modern IT departments and Managed Service Providers (MSPs), the platform provides a unified view of the entire identity perimeter, spanning every user, app, and permission level. By turning complex governance into autonomous workflows, Josys handles everything from shadow IT discovery and license rightsizing to automated access audits and lifecycle management. The result is a more secure, cost-effective environment where operational efficiency is the standard, not the goal.

API Access

Has API

API Access

Has API

Screenshots View All

No images available

Screenshots View All

Integrations

Amazon Web Services (AWS)
Apollo
Assembla
Auth0
Bluebeam Revu
Bonusly
ClickUp
Clinked
Confluence
Discord
Figma
Intercom
Ivanti Neurons for ASPM
Ivanti Neurons for UEM
Ivanti Neurons for Zero Trust Access
OpenAI
Salesforce
SmartHR
Zendesk
monday work management

Integrations

Amazon Web Services (AWS)
Apollo
Assembla
Auth0
Bluebeam Revu
Bonusly
ClickUp
Clinked
Confluence
Discord
Figma
Intercom
Ivanti Neurons for ASPM
Ivanti Neurons for UEM
Ivanti Neurons for Zero Trust Access
OpenAI
Salesforce
SmartHR
Zendesk
monday work management

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$100/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Ivanti

Founded

2017

Country

United States

Website

www.ivanti.com

Vendor Details

Company Name

Josys

Founded

2022

Country

Japan

Website

www.josys.com

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Business Intelligence

Ad Hoc Reports
Benchmarking
Budgeting & Forecasting
Dashboard
Data Analysis
Key Performance Indicators
Natural Language Generation (NLG)
Performance Metrics
Predictive Analytics
Profitability Analysis
Strategic Planning
Trend / Problem Indicators
Visual Analytics

Cloud Cost Management

Cost Reduction Optimization
Dashboard
Data Import/Export
Data Storage
Data Visualization
Resource Usage Reporting
Roles / Permissions
Spend and Cost Reporting

Configuration Management

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Document Management

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

File Sync

Audit Trail
Backup and Recovery
Conflict Detection
Real Time Synchronization
Remote Synchronization
Synchronization Scheduling
Two-Way Synchronization

GRC

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

Help Desk

Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
IT Asset Management
Incident Management
Interaction Tracking
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

IT Service

Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management

ITSM

Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal

License Management

Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Project Portfolio Management

Budget Management
Collaboration
Dashboard
Issue Management
Milestone Tracking
Portfolio Management
Project Planning
Requirements Management
Resource Management
Status Tracking
Task Management
Time & Expense Tracking

Reporting

Customizable Dashboard
Data Source Connectors
Drag & Drop
Drill Down
Email Reports
Financial Reports
Forecasting
Marketing Reports
OLAP
Report Export
Sales Reports
Scheduled / Automated Reports

VPN

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

Cloud Cost Management

Josys serves as a cutting-edge platform for Automated Identity Governance and Administration (IGA), transforming identity management into a key strategy for lowering cloud expenditures. By systematically pinpointing unused licenses, excessive account provisions, duplicate applications, and shadow IT within your cloud infrastructure, Josys equips IT and finance departments with the immediate insights required to minimize unnecessary expenses and optimize spending. Its automated lifecycle management guarantees that access and costs align with the current workforce dynamics, providing the governance precision that leads to tangible cost reductions.

Cost Reduction Optimization
Dashboard
Data Import/Export
Data Storage
Data Visualization
Resource Usage Reporting
Roles / Permissions
Spend and Cost Reporting

Endpoint Management

Josys serves as an Automated Identity Governance and Administration (IGA) Platform designed to connect endpoint operations with identity management. By linking user identities to their access rights on various devices and applications, Josys empowers IT teams with the insights necessary to implement uniform access policies, identify unauthorized endpoint activities, and promptly revoke access rights when users exit or transition to different roles. This leads to a well-regulated environment where endpoints do not serve as unnoticed entry points to sensitive systems.

Identity and Access Management (IAM)

Josys serves as a cutting-edge platform for Automated Identity Governance and Administration (IGA), transforming Identity and Access Management from a merely reactive approach to a proactive and insightful governance strategy. This platform provides comprehensive oversight of every user, role, application, and permission within the identity landscape, ensuring that access remains consistently aligned with organizational requirements. With features like automated provisioning, access reviews, shadow IT identification, and reporting that meets audit standards, Josys empowers IT departments with a cohesive platform to efficiently and confidently oversee the entire IAM lifecycle.

Identity Governance and Administration (IGA)

Josys serves as a cutting-edge platform for Automated Identity Governance and Administration (IGA), designed to streamline enterprise-level governance with automation and scalability. By integrating the complete identity lifecycle—from access requests and provisioning to periodic reviews and deprovisioning—Josys removes the labor-intensive tasks and policy discrepancies that pose security and compliance threats. Valued by IT departments and Managed Service Providers (MSPs), Josys simplifies intricate IGA needs into smooth, self-sustaining workflows. This empowers organizations to satisfy audit requirements, uphold least-privilege access, and showcase governance maturity, all while minimizing operational burdens.

Identity Management

Josys is a cutting-edge Automated Identity Governance and Administration (IGA) Platform that revolutionizes identity management, shifting it from a cumbersome manual process to a streamlined, intelligent operation. Valued by IT departments and Managed Service Providers worldwide, Josys offers comprehensive oversight of user identities from onboarding to offboarding. It automates key tasks such as provisioning, access assessments, and role assignments across all applications within your ecosystem. By tackling identity sprawl and implementing least-privilege access on a large scale, Josys guarantees that the appropriate individuals maintain the correct access at the most opportune moments, minimizing risk while keeping your business operations efficient.

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Asset Management

Josys is an advanced platform designed for Automated Identity Governance and Administration (IGA), empowering IT departments with comprehensive oversight of their software assets. It automatically identifies all applications being utilized, including unauthorized shadow IT, and compiles a dynamic inventory that details licenses, user behavior, and access rights throughout your organization. With features for optimizing licenses and analyzing expenditures, Josys helps you avoid unnecessary costs for unutilized licenses while ensuring compliance standards are met. This transforms the disorder of IT assets into a streamlined, regulated, and financially efficient portfolio.

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Josys is an innovative platform for Automated Identity Governance and Administration (IGA) designed to streamline and enhance IT management significantly. Favored by IT departments and managed service providers, Josys consolidates oversight of users, applications, devices, and permissions, eliminating the need for disjointed spreadsheets and manual processes. It offers automated management of user lifecycles, access audits, and continuous governance in real time. Whether you're bringing a new employee on board, managing the exit of a staff member, or conducting access audits across multiple SaaS applications, Josys transforms labor-intensive IT tasks into smooth, self-sufficient workflows that bolster your organization's security and operational efficiency.

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Mobile Device Management (MDM)

Josys serves as a comprehensive platform for Automated Identity Governance and Administration (IGA), offering organizations identity-centric control across all their devices. By linking user identities to device access, Josys provides a consolidated view of access activities, regardless of whether users are on a company-issued laptop, a personal smartphone, or a remote device. This empowers IT departments and Managed Service Providers (MSPs) to implement access protocols, identify irregularities, and quickly revoke permissions when a user or device is deemed unauthorized. Ultimately, Josys enables a smooth and secure mobile workforce while effectively addressing the governance shortfalls often associated with traditional Mobile Device Management (MDM) solutions.

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

MSP

Josys stands as a specialized Automated Identity Governance and Administration (IGA) Platform designed specifically for Managed Service Providers (MSPs). Its primary goal is to offer a consistent and scalable approach to identity governance for all clients under their management. With its centralized multi-tenant visibility feature, Josys allows MSPs to effectively oversee user access, implement compliance regulations, streamline onboarding and offboarding processes, and identify shadow IT—all from one comprehensive interface. By converting the traditionally complex governance tasks of individual clients into uniform, automated procedures, Josys empowers MSPs to cut down on service delivery expenses, enhance their clients' security measures, and expand their operational capacity without the need for increasing staff.

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

SaaS Management

Josys is an innovative platform designed for Automated Identity Governance and Administration (IGA) that streamlines the often-chaotic environment of enterprise SaaS. Valued by IT departments overseeing extensive application networks, Josys automatically identifies both approved and unapproved applications in operation, aligns access rights with specific users, and perpetually tracks shadow IT and excess account privileges. By merging visibility into SaaS applications with automated governance processes—ranging from access evaluations to the retirement of applications—Josys empowers organizations to regain authority over their SaaS portfolio, eradicate security gaps, and cut costs by discontinuing unused services.

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

SaaS Spend Management

Josys serves as an Automated Identity Governance and Administration (IGA) solution that seamlessly integrates SaaS expense management into effective governance practices. By persistently monitoring user access to various applications and assessing their actual usage, Josys identifies licenses that are underutilized, eliminates unnecessary tools, and reveals shadow IT expenditures that can unnecessarily drive up your SaaS costs. Featuring automated workflows for license reclamation and real-time analytics on spending, Josys equips IT and finance departments with the insights needed to make informed choices that reduce SaaS expenses while maintaining robust governance.

User Provisioning and Governance

Josys is an innovative platform for Automated Identity Governance and Administration (IGA) that transforms the landscape of efficient and secure user provisioning. It features automated onboarding processes that provide appropriate access from the very first day and offboarding procedures that instantly remove all permissions when an employee leaves. Josys guarantees that access is meticulously managed without oversight gaps. With ongoing access evaluations, role-specific provisioning, and live audit logs, Josys empowers IT departments to ensure that each user possesses precisely the access they require, with no excess.

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Alternatives

Ivanti vADC Reviews

Ivanti vADC

Ivanti
SailPoint Reviews

SailPoint

SailPoint Technologies