Browse Software
List Your Product
Loading...
Keycloak logo

Keycloak

  Add to Compare

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Ping Intelligent Identity logo
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Red Hat Identity Management logo
View Details

Overview

Description Ping Intelligent Identity is a single solution for identity management and automated workflows across all the chosen identity platforms. The solutions set of the cloud platform helps enterprises to decide and finalise on the right set of requirements along with specific use cases. Here the client companies are allowed to learn about their requirements, solve use cases on a single platform and orchestrate growth with future-oriented solutions. PingOne for Customers is designed to deliver seamless communication from their end that includes passwordless logins, easy registrations and interactive newsletters to mention a few. PingOne for the workforce has been designed keeping in mind the needs of the working teams. One of their foremost requirements is the delivery of standardised and intelligent authentication for any user, device, application or identity storage in any scenario. Ping Intelligent Identity is thus, the best option for combining solutions and transforming the enterprise in concern. Read more Red Hat Identity Management (IdM) is the perfect solution for businesses seeking a comprehensive and unified system to manage identity stores, authentication, policies, and authorization policies in their Linux-based domain. With IdM, can guarantee secure access to the customers applications with fast performance. As it is based on open source technology, administrators have full control over every aspect of security to ensure everything is adapted to their needs. IdM delivers low costs of ownership as easy installation and reliable performance take out the strain of managing systems’ configurations. Get ready for a framework that is designed to simplify tasks yet maintain robust security standards. Businesses wanting a complete solution for the identity management needs need not look further - Red Hat Identity Management is here! Red Hat Identity Management is a game-changer, empowering professionals like to take charge of identity management with confidence and ease. Say goodbye to fragmented systems and hello to a centralized, unified approach, all while adhering to the strictest of industry standards. Seize the opportunity today, and unlock the true potential of the Linux-based domain with Red Hat IdM. Read more
Pricing Options
  • Free Trial Available
  • Offers Custom plan.
  • Free Trial Not Available
  • Offers Custom plan.
SW Score & Breakdown

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    94%
  • Reviews
    86%
  • Momentum
    61%
  • Popularity
    62%

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    89%
  • Reviews
    60%
  • Momentum
    64%
  • Popularity
    64%

Features

Total Features
9 Features
7 Features
Common Features for All
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
    • Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 4 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    Modes of Support
    • Business Hours
    • Online
    • Business Hours
    • Online
    API Support
    • Available
    • NA

    Reviews & Ratings

    User Rating
    4.5/5 222 user ratings
    Not Available
    Rating Distribution
    • Excellent

      59%
    • Very Good

      36%
    • Average

      2.7%
    • Poor

      1.4%
    • Terrible

      0.9%
    Not Available
    User Sentiments

      Ease of Use, Secure Authentication, Seamless SSO experience, Extensive Integrations

      Complex Configuration, Occasional Performance Issues, Suboptimal Documentation, Mobile App Issues

      Not Available
    Review Summary

    Based on reviews, Ping Identity generally receives positive feedback for its strong security features, ease of use, and reliable customer support. Users appreciate its multi-factor authentication, single sign-on capabilities, and user-friendly interface. Its integration with various applications and ability to manage user identities across multiple platforms are also praised. However, some reviewers have expressed concerns regarding occasional technical glitches and the need for improvement in documentation and reporting capabilities. Overall, Ping Identity is considered a robust and secure identity management solution with room for further enhancement in certain areas.

    Not Available
      Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Offers Custom plan.
    • Free Trial Not Available
    • Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    Ping Intelligent Identity Custom

    Red Hat Identity Management Custom

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Videos Video Thumbnail
    + 1 More
    Not Available

    Vendor information

    Company Details Located in: Denver, Colorado

    Not available

    Contact Details

    Not available

    https://www.pingidentity.com/en/platform/platform-overview.html

    Not available

    https://access.redhat.com/products/identity-management/

    Social Media Handles

    Not available

    Not available

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed