AI Buyer Insights:

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Michelin, an e2open customer evaluated Oracle Transportation Management

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Michelin, an e2open customer evaluated Oracle Transportation Management

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

List of Netwrix Directory Manager Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight Insight Source
Alaska Airlines Transportation 30536 $11.7B United States Netwrix Netwrix Directory Manager Identity and Access Management (IAM) 2016 n/a In 2016 Alaska Airlines implemented Netwrix Directory Manager to audit, review, and attest Active Directory and Azure AD group memberships as part of its Identity and Access Management (IAM) efforts. Netwrix Directory Manager, the product formerly known as Imanami GroupID, was used to centralize group lifecycle management and governance for enterprise IT and communications processes across the airline. The implementation emphasized automated owner notifications, scheduled attestation workflows, and policy-driven removal of obsolete groups to reduce group sprawl. Configuration focused on group membership auditing, attestation task orchestration, and automated remediation rules for inactive or orphaned groups, aligning with standard Identity and Access Management (IAM) functional workflows. Integrations were explicitly built with Active Directory and Azure AD to pull membership data, trigger owner notifications, and record attestation outcomes. Operational coverage included enterprise IT and communications teams, with workflows intended to reduce routine helpdesk requests related to group membership and to improve identity governance across directory services. Governance changes centered on instituting regular attestation cycles and automated owner-driven approvals, shifting responsibility for group hygiene to designated owners. Outcomes described in the case study include strengthened security posture through removal of obsolete groups and reduced helpdesk overhead driven by automation of notification and attestation processes.
American Tower Communications 6391 $10.5B United States Netwrix Netwrix Directory Manager Identity and Access Management (IAM) 2011 n/a In 2011, American Tower implemented Netwrix Directory Manager as an Identity and Access Management (IAM) solution to automate staff directory and distribution-list workflows. The deployment leveraged Imanami GroupID modules, specifically WebDir and SmartDL, which are now part of Netwrix Directory Manager functionality, to provide a web-based staff directory and automated distribution-list management. The implementation configured WebDir to present an intranet-accessible staff directory and SmartDL to provision and manage distribution lists, with logic to populate accurate AD attributes. Netwrix Directory Manager was used to reduce manual directory maintenance by centralizing attribute updates and automating list membership reconciliation. Integrations included direct population of Active Directory attributes across American Tower s global infrastructure, enabling synchronized identity attributes and distribution list provisioning. Operational scope spanned IT and HR directory administration, and the solution supported internal communications and directory hygiene across multiple sites. Governance changes focused on shifting routine directory updates from manual administrator tasks to automated processes, improving attribute accuracy and distribution list lifecycle management. The deployment explicitly improved internal communications and saved administrator hours for IT and HR related directory tasks as described in the referenced case study.
Pennsylvania Office Of Attorney General United States Government 800 $200M United States Netwrix Netwrix Directory Manager Identity and Access Management (IAM) 2013 n/a In 2013, the Pennsylvania Office of Attorney General implemented Netwrix Directory Manager to automate Active Directory group and user management across its US state government environment. Netwrix Directory Manager, an Identity and Access Management (IAM) solution, focused on accelerating HR driven communications and provisioning workflows that involve both HR and IT teams. The deployment leveraged Netwrix Directory Manager and the predecessor Imanami GroupID to provide self service user and group management, automated provisioning and deprovisioning, and group hygiene capabilities. Configuration work included role based group membership policies, approval workflows for access changes, and automation of group membership cleanup to maintain directory hygiene. Integration centered on Active Directory to synchronize HR events into provisioning workflows and to enforce group membership automation across offices. Governance changes standardized HR driven request handling and approval steps between HR and IT, and the documented implementation cut multi day tasks to minutes.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating Netwrix Directory Manager

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Netwrix Directory Manager. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found