Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (5)
Starting Price
  • (15)
  • (1)
  • (4)
  • (1)
  • (10)
Features
  • (77)
  • (75)
  • (74)
  • (74)
  • (71)
  • (64)
  • (60)
  • (58)
  • (53)
  • (43)
  • (33)
SW Score
  • (2)
  • (1)
  • (18)
  • (31)
  • (21)
Deployment
  • (13)
  • (6)
  • (89)
  • (22)
  • (19)
Customer Types
  • (9)
  • (7)
  • (87)
  • (88)
  • (83)
Pricing Model
  • (36)
  • (27)
  • (2)
  • (6)
  • (42)
  • (70)
Integrated With
  • (10)
  • (6)
  • (6)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 61 - 80 of 89 Products

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CodeShield logo
Detect Security Vulnerabilities in Minutes Write a Review
View Details + Add to Compare

What is CodeShield and how does it work?

CodeShield software is a platform used to reveals hidden connections, and vulnerabilities to move within cloud and reach critical assets. Privilege escalation and attack scenario used to identify escalation and prioritize them. Build a complete graph of AWS resources and IAM policies into a single graph to automate workflows. It integrates with Jira, GitHub, GitLab.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 88%
  • Reviews 60%
  • Momentum 66%
  • Popularity 74%

CodeShield Pricing

  • Free Trial Not Available
  • Starts at $99.00. Offers Free-forever and Custom plan.
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Passbase logo
Create a powerful and easy-to-use customer verification system easily 5 Based on 1 Ratings
View Details + Add to Compare

What is Passbase and how does it work?

Passbase is a KYC and ID verification solution that enables businesses with customer identity verification through selfies, documents and government databases. The solution helps users to authenticate more than 6000 government-issued identity documents from over 190 countries within seconds. It is also equipped with an advanced NIST face comparison technology that businesses can use to match photo IDs and prevent spoofing attacks in real-time. Passbase allows users to strengthen their verification program by checking through the global AML watchlist or additional documents required. The solution makes it easy for businesses to assemble and adjust their verification flow by helping the latter to design, maintain and deploy intuitive identity solutions in minutes. Moreover, powerful SDKs loaded within, help users to sync data in an instant via webhooks. Passbase includes a variety of popular tools that can be used to prototype individual ideas and launch an effective and efficient verification system within minutes.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 81%
  • Reviews 66%
  • Momentum 64%
  • Popularity 83%

Passbase Pricing

  • Free Trial Available
  • Starts at $99.00. Offers Free-forever plan.
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

BlackBerry Enterprise Identity logo
Advance Your Mobile Strategy with Simple, Secure Identity Management 5 Based on 9 Ratings
View Details + Add to Compare

What is BlackBerry Enterprise Identity and how does it work?

BlackBerry Enterprise Identity delivers access control designed to provide the security of traditional user authentication. BlackBerry Enterprise Identity delivers a superior single sign-on user experience. Employees can use one password for all cloud services, across all mobile devices (iOS, Android and BlackBerry) and traditional computing platforms (Windows and macOS). This eliminates the frustration of multiple passwords and logins, and users will only confront stronger methods when they’re a necessary security measure.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 87%
  • Reviews 74%
  • Momentum 61%
  • Popularity 63%

BlackBerry Enterprise Identity Pricing

  • Free Trial Available
  • Offers Custom plan.
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Red Hat Identity Management logo
"Red Hat IdM centralizes Linux identity management" Write a Review
View Details + Add to Compare

What is Red Hat Identity Management and how does it work?

Red Hat Identity Management (IdM) is the perfect solution for businesses seeking a comprehensive and unified system to manage identity stores, authentication, policies, and authorization policies in their Linux-based domain. With IdM, can guarantee secure access to the customers applications with fast performance. As it is based on open source technology, administrators have full control over every aspect of security to ensure everything is adapted to their needs. IdM delivers low costs of ownership as easy installation and reliable performance take out the strain of managing systems’ configurations. Get ready for a framework that is designed to simplify tasks yet maintain robust security standards. Businesses wanting a complete solution for the identity management needs need not look further - Red Hat Identity Management is here! Red Hat Identity Management is a game-changer, empowering professionals like to take charge of identity management with confidence and ease. Say goodbye to fragmented systems and hello to a centralized, unified approach, all while adhering to the strictest of industry standards. Seize the opportunity today, and unlock the true potential of the Linux-based domain with Red Hat IdM.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 60%
  • Momentum 64%
  • Popularity 64%

Red Hat Identity Management Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ManageEngine Identity360 logo
A cloud-based workforce IAM platform bolstering enterprises with identity-first security Write a Review
Visit Website + Add to Compare

What is ManageEngine Identity360 and how does it work?

ManageEngine Identity360 is a cloud-native identity platform that helps enterprises address workforce IAM challenges. Its powerful capabilities include a built-in Universal Directory, identity orchestration, SSO, MFA for enterprise apps and endpoints, role-based access control, detailed reports, and more. It empowers admins to manage identities across directories and their access to enterprise applications from a secure, centralized console. With Identity360, not only can enterprises scale their businesses effortlessly, but they can also ensure compliance and identity-first security.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 95%
  • Reviews 60%
  • Momentum 60%
  • Popularity 64%

ManageEngine Identity360 Pricing

  • Free Trial Available
  • Starts at $195.0. Offers Free-forever plan.
Visit Website

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
Account Security Solutions To Manage Identity Life Cycles 4.7 Based on 19 Ratings
View Details + Add to Compare

What is CyberArk Conjur and how does it work?

CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 80%
  • Reviews 71%
  • Momentum 63%
  • Popularity 69%

CyberArk Conjur Pricing

  • Free Trial Not Available
View Details

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Teleport Desktop Access logo
A single Access Plane for mixed environments Write a Review
View Details + Add to Compare

What is Teleport Desktop Access and how does it work?

Identity-based, passwordless access to Windows hosts across all cloud, on-premises, and edge environments. Upgrade your entire Windows fleet to security best practices, including SSO, MFA, and passwordless just-in-time access via short-lived certificates. Teleport provides a secure, passwordless login experience to Windows machines using your favorite hardware device.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 90%
  • Reviews 60%
  • Momentum 61%
  • Popularity 62%

Teleport Desktop Access Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Lumos logo
Make Your Organization Secure, Compliant & Productive 4.9 Based on 51 Ratings
View Details + Add to Compare

What is Lumos and how does it work?

Lumos simplifies the access process for companies. It is an internal AppStore that helps to automate access requests, reviews and license management. This self-service platform helps to reduce the number of support tickets and makes access requests and approvals faster and more efficient. Lumos provides visibility into SaaS applications and spend, and also enables automated workflows for removing unused licenses. It is an ideal platform for companies looking to streamline their access process and reduce manual workload. Additionally, it helps to improve security and compliance as well as provides an overview of all applications used in the organization. Lumos provides an efficient and secure way for companies to manage their access requests and licenses.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 73%
  • Reviews 73%
  • Momentum 69%
  • Popularity 75%

Lumos Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Authenteq logo
A Secure Platform for Identity verification 4 Based on 2 Ratings
View Details + Add to Compare

What is Authenteq and how does it work?

Authenteq software is an identity verification tool used to automate business process. The software uses AI tool to prevent identity theft and fraud for business. It can integrate into your website or app to optimize the experience with AI to automate the authentication process. Small and Medium companies make use of the software.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 81%
  • Reviews 62%
  • Momentum 62%
  • Popularity 76%

Authenteq Pricing

  • Free Trial Available
View Details

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

iDenfy logo
Identity verification software 5 Based on 80 Ratings
View Details + Add to Compare

What is iDenfy and how does it work?

IDenfy is an online identity verification company, helping to reduce frauds and make business smoother and more profitable. Digital wallets are just simply awesome. Not only they help you be efficient in your daily life it also grants freedom to users. From making a payment using NFC technologies to verifying age. A game of skill, a promise of a fair play and a great online experience attracts a loyal following. While online gaming has been a disrupter on its own allowing responsibly enjoy service for millions, it has become a target.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 73%
  • Reviews 78%
  • Momentum 64%
  • Popularity 77%

iDenfy Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Bare.ID logo
Highly Secure Single Sign On SaaS Write a Review
View Details + Add to Compare

What is Bare.ID and how does it work?

Bare.ID stands for user-friendly identity and access management in the cloud. With Bare.ID you can connect digital business processes and applications to a local user directory and benefit from centralized security and single sign-on.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 84%
  • Reviews 60%
  • Momentum 61%
  • Popularity 68%

Bare.ID Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Trust Swiftly logo
Enhance Trust and Security with Adaptive Identity Verification 5 Based on 2 Ratings
View Details + Add to Compare

What is Trust Swiftly and how does it work?

Trust Swiftly ensures businesses remain data compliant while prioritizing customer privacy. This identity and access management software allows customers to share only the necessary information for verification, securely storing data according to the customer's location. By offering flexible and accurate identity verification through SMS, Voice, ID, Liveness, Document, Video, Social, Banking, and more, Trust Swiftly helps businesses approve genuine customers and block fraud. The software's adaptive verification methods ask for authentication based on risk scores or business rules, ensuring minimal disruption for legitimate users. Automated verification keeps the process swift and seamless, integrating with existing fraud tools as a KYC solution. Trust Swiftly's advanced AI techniques protect against adversarial AI, deepfakes, and sophisticated attacks, providing robust security for any fintech, store, app, or marketplace. With Trust Swiftly, businesses can offer verifications even for privacy-conscious customers, enhancing trust and security across the board.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 76%
  • Reviews 62%
  • Momentum 68%
  • Popularity 73%

Trust Swiftly Pricing

  • Free Trial Available
  • Starts at $29.0. Offers Custom plan.
View Details

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Unidy logo
Elevate identity management enhance user experiences Write a Review
View Details + Add to Compare

What is Unidy and how does it work?

Unidy offers powerful migration, aggregation, and user matching options that kick-start central identity management. By constantly synchronizing user data across all connected sources, Unidy aggregates user profiles based on central user IDs, sets user groups, and manages access rights. Its CIAM and SSO capabilities significantly boost conversions with seamless Single Sign-On integration. Whether integrating anywhere or offering personalized consent screens, Unidy ensures clear, accountable consent management in line with GDPR, hosted entirely within the EU. Branded user accounts and zero-party data collection help grow your user database while maximizing revenue per user. Empower digital experiences with Unidy’s ready-to-go identity management solution, converting data silos into digital growth and reducing IT costs through premier integrability.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 80%
  • Reviews 60%
  • Momentum 64%
  • Popularity 68%

Unidy Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Apono logo
Effortless, Secure Access Management Write a Review
View Details + Add to Compare

What is Apono and how does it work?

Apono's automatic granular permissions are essential for keeping their business running smoothly and securely. With Cloud Just-In-Time Access, manual permission management tasks become a thing of the past, thanks to Apono Access Flows. These flows enable automated, contextual permissions with auto-expiring capabilities, ensuring no permissions are left behind. Tailor access duration and resources precisely to each task, granting specific access to namespaces or resources with comprehensive audit logs. This approach not only removes permission bottlenecks but also satisfies customer requirements and prevents human errors in production. Gain full access control and visibility over their Kubernetes clusters with on-demand, granular permissions to databases, buckets, repositories, and other resources all managed directly from Slack, Teams, or their CLI. Dynamic, context-based access control and automated reporting capabilities allow them to see who has access to what, how, and why across their entire infrastructure and applications. With Apono, access management becomes effortless, providing peace of mind and operational efficiency.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 76%
  • Reviews 60%
  • Momentum 70%
  • Popularity 69%

Apono Pricing

  • Free Trial Not Available
  • Starts at $49.0. Offers Free-forever and Custom plan.
View Details

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Ezeelogin logo
Setup your On-prem SSH Jump Server 4.8 Based on 10 Ratings
View Details + Add to Compare

What is Ezeelogin and how does it work?

Creating a self-hosted jump server is an easy way to manage secure shell (SSH) access to Linux servers, routers, switches, and cloud instances. It can be used to control who has access to certain systems and centrally manage authentication and logging. The setup process is relatively straightforward and can be completed in a few steps. First, user will need to provision a machine to host the jump server. It should have an operating system supported by organization, sufficient RAM and disk space, and a public IP address. Next, user will need to configure the server. This includes setting up a firewall, installing the required software, and configuring the SSH server.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 72%
  • Reviews 70%
  • Momentum 62%
  • Popularity 74%

Ezeelogin Pricing

  • Free Trial Available
  • Starts at $1.99. Offers Custom plan.
View Details

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

OwnID logo
A digital world with effortless passwordless authentication 5 Based on 2 Ratings
View Details + Add to Compare

What is OwnID and how does it work?

OwnID is an easy-to-use platform for website registration and login forms. It allows users to authenticate securely with biometrics stored on their phone, instead of a password. The button is simple and blends in with existing forms. It is also cross-OS, cross-device and cross-domain compatible. Identification is based on phone stored cryptographic keys and is protected with biometrics, without requiring a phone number.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 76%
  • Reviews 67%
  • Momentum 63%
  • Popularity 68%

OwnID Pricing

  • Free Trial Not Available
  • Starts at $0.01. Offers Free-forever and Custom plan.
View Details

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Helix logo
Identity and Access Management (IAM) Platform Write a Review
View Details + Add to Compare

What is Helix and how does it work?

Helix is a blockchain-based IAM solution that makes it easy for organizations to verify the credentials of their employees across the complete IT ecosystem. Through the tool, users can manage the entire lifecycle of their employees with real-time access management and visibility. They can even assign every employee new roles and permissions or revoke the old ones. And with a well-managed platform, data duplication and SOD can be prevented. The Risk Management feature of the tool enables one-click GDPR compliance. It also keeps the organization audit-ready and SOX, HIPPA, PCI, HITECH compliant along with extending Flexible 2FA options. With the Cloud Native functionality, the tool can even remotely grant access to employees, along with providing automated updates. New and pre-integrated apps can be quickly and easily deployed. Elements of the employee lifecycle that can be managed through the app include registration and onboarding, profile updates, offboarding, password recovery, and more.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 85%
  • Reviews 60%
  • Momentum 60%
  • Popularity 61%

Helix Pricing

  • Free Trial Available
  • Offers Custom plan.
View Details

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

AgencyAccess logo
An Easy way to access clients Write a Review
View Details + Add to Compare

What is AgencyAccess and how does it work?

Introducing AgencyAccess, the answer to all their client account management woes. Say goodbye to the endless back-and-forth of password sharing and complicated setup procedures. With just one simple link, they can effortlessly connect to all their client's accounts, saving they valuable time and headaches. Not only does AgencyAccess make connecting to client accounts a breeze, but it also prioritizes the security and privacy of both their agency and their clients. Rest assured that their data is safe and meets GDPR compliance standards, giving they peace of mind as they work with sensitive information. But it doesn't stop there. AgencyAccess also allows they to create a unique and impressive onboarding process for their clients, showcasing their agency's expertise and commitment to excellence right from the start. Make a strong first impression and set yourself apart from the competition. Don't waste another minute on tedious account management tasks. Let AgencyAccess streamline their workflow and elevate their client relationships. Experience the power of seamless collaboration and efficient workflow management with AgencyAccess. Say hello to a new era of productivity and professionalism.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 81%
  • Reviews 60%
  • Momentum 62%
  • Popularity 63%

AgencyAccess Pricing

  • Free Trial Available
  • Starts at $23.00.
View Details

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Corma logo
Access and Identity Management made simple Write a Review
View Details + Add to Compare

What is Corma and how does it work?

Corma is the ultimate access management platform that will revolutionize the way they handle their apps and accounts. With Corma, they'll finally have all their apps and accounts in one place, making it effortless to manage them all. From access control policies to provisioning. Corma also helps they drive down software costs by streamlining renewals and cutting unused licenses. Every contract will be maximized to its full potential, saving they time and money. Corma is incredibly easy and fast to set up. In just minutes, they'll be live and reaping the benefits of automated role-based access control through their active directory. No more waiting around for complicated installations and setups. Don't just take this word for it - professionals with a third-party perspective can attest to the efficiency and effectiveness of Corma.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 76%
  • Reviews 60%
  • Momentum 63%
  • Popularity 68%

Corma Pricing

  • Free Trial Available
  • Offers Custom plan.
View Details

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Trend Micro ID Protection logo
Start protecting your identity today Write a Review
View Details + Add to Compare

What is Trend Micro ID Protection and how does it work?

Introducing Trend Micro ID Protection, the ultimate solution for safeguarding their online identity. Formerly known as Trend Micro Check, this powerful tool is their all-in-one adblocker, password manager, and privacy-enhancing browser extension. But what sets Trend Micro ID Protection apart from other privacy tools? First and foremost, it's this commitment to providing a comprehensive suite of features to ensure their online security. With just one download, they can say goodbye to invasive trackers, annoying ads, and the constant worry of navigating through dangerous websites. This extension not only blocks these threats, but also cleans and secures their browser, and even helps they manage their passwords. No more struggling to remember dozens of login credentials they've got they covered. But the protection doesn't end there. Through this extension, they gain access to the ID Protection portal and mobile app, where they'll find a host of additional features. This team tirelessly scours the internet and dark web for any mention of their personal information, so they can stay one step ahead of identity-related threats. Your private vault is where they can securely store their passwords and sensitive notes, all protected by their unique Trend Micro Account password and client key for added peace of mind. This informative and authoritative brand voice exudes confidence in this ability to keep they safe online. And we understand that this target audience, professionals with a third party perspective, demand nothing less. So why wait? Take control of their online privacy today with Trend Micro ID Protection. Download now and protect what matters most their identity.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 75%
  • Reviews 60%
  • Momentum 65%
  • Popularity 65%

Trend Micro ID Protection Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
View Details

Pricing Insights for Identity and Access Management (IAM) Software

  • The Average Cost of a basic Identity and Access Management (IAM) Software plan is $9 per month.

  • 42% of Identity and Access Management (IAM) Software offer a Free Trial Allows users to try out the software for a limited period before making a purchase decision. , while 31% offer a Freemium Model Allows users to access basic features at no cost..

List of Identity and Access Management (IAM) Software

PRODUCT NAME SW SCORE AGGREGATED RATINGS
CodeShield CodeShield 82 0
Passbase Passbase 81 5
BlackBerry Enterprise Identity BlackBerry Enterprise Identity 81 5
Red Hat Identity Management Red Hat Identity Management 81 0
ManageEngine Identity360 ManageEngine Identity360 81 0
CyberArk Conjur CyberArk Conjur 81 4.7
Teleport Desktop Access Teleport Desktop Access 80 0
Lumos Lumos 80 4.9
Authenteq Authenteq 80 4
iDenfy iDenfy 80 5

Overview

Identity and Access Management (IAM) refers to a process that an organisation follows to identify, authenticate and authorise groups of people or individuals to gain access to systems, networks and applications, along with implied rights and restrictions with established identities. These include software processes which require access to organisational systems. It authenticates users and even dictates whether they can access particular applications and systems or not and to what level can they access it. It mainly focuses on the security and productivity of an organisation.

Identity and Access management software presents a strategy for the security system of a business organisation. They levy a high degree of control and enables the implementation of logging and accounting capabilities. These platforms can be applied universally and can include applications and devices which do not need any manual supervision. What makes this software very handy and efficient is that they can be operated on various devices. IAM software is extremely reliable, enable cost control and are incredibly scalable. However, there are certain things which should be kept in mind while selecting the apt software for your business enterprise.

  • Assure Compatibility: The Identity and access software that you choose for your organisation should have complete compliance with your business security systems, directory services, management consoles and other essentials. 
  • Scale from Pilot deployments: Before proceeding towards full-production deployment, it is highly essential to understand how this platform operates in an IT environment. Also, make sure the goals of your security policies remain unaltered by conducting ongoing security audits.
  • Verify internal support services: The tools, policies and procedures to be implemented should be well explained to the help desk and other support staff, including a proper training regarding social engineering and related attacks to ensure effective utilisation of the software’s products.

Features

Typical Features

API Access Management

Ensures that calls with authenticated access can enter APIs

Passwordless Login

Allows to login without password using other means of verification, e.g. SSH keys

Social Sign On

Allows users to sign on using credentials of social networking services

Single Sign-On (SSO)

Permits one set of login credentials to access multiple applications

User Activity Monitoring

Monitors and records user activities in the enterprise

Role Management

Helps regulate access to systems, based on individual roles

Multi-factor Authentication

Uses more than one method to verify a user's identity for a login

Password Management

Enables the administrator to manage, authenticate and reset passwords

Account Management

Helps to manage user accounts within organisations

Access Request Management

Helps to view and manage access requests submitted by the personnel

Compliance Management

Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed