Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (5)
Starting Price
  • (16)
  • (1)
  • (4)
  • (1)
  • (11)
Features
  • (76)
  • (74)
  • (73)
  • (73)
  • (70)
  • (63)
  • (59)
  • (57)
  • (52)
  • (42)
  • (33)
SW Score
  • (2)
  • (1)
  • (18)
  • (30)
  • (21)
Deployment
  • (15)
  • (6)
  • (94)
  • (23)
  • (20)
Customer Types
  • (9)
  • (6)
  • (92)
  • (93)
  • (87)
Pricing Model
  • (37)
  • (27)
  • (2)
  • (6)
  • (44)
  • (73)
Integrated With
  • (10)
  • (6)
  • (6)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 61 - 80 of 94 Products

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Trend Micro ID Protection logo
Start protecting your identity today Write a Review
View Details + Add to Compare

What is Trend Micro ID Protection and how does it work?

Introducing Trend Micro ID Protection, the ultimate solution for safeguarding their online identity. Formerly known as Trend Micro Check, this powerful tool is their all-in-one adblocker, password manager, and privacy-enhancing browser extension. But what sets Trend Micro ID Protection apart from other privacy tools? First and foremost, it's this commitment to providing a comprehensive suite of features to ensure their online security. With just one download, they can say goodbye to invasive trackers, annoying ads, and the constant worry of navigating through dangerous websites. This extension not only blocks these threats, but also cleans and secures their browser, and even helps they manage their passwords. No more struggling to remember dozens of login credentials they've got they covered. But the protection doesn't end there. Through this extension, they gain access to the ID Protection portal and mobile app, where they'll find a host of additional features. This team tirelessly scours the internet and dark web for any mention of their personal information, so they can stay one step ahead of identity-related threats. Your private vault is where they can securely store their passwords and sensitive notes, all protected by their unique Trend Micro Account password and client key for added peace of mind. This informative and authoritative brand voice exudes confidence in this ability to keep they safe online. And we understand that this target audience, professionals with a third party perspective, demand nothing less. So why wait? Take control of their online privacy today with Trend Micro ID Protection. Download now and protect what matters most their identity.

Read more Read less

Trend Micro ID Protection Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    75%
  • Reviews
    60%
  • Momentum
    65%
  • Popularity
    65%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Shufti Pro logo
Verifying Identities Instantly for Business 4.7 Based on 281 Ratings
View Details + Add to Compare

What is Shufti Pro and how does it work?

Shufti Pro is an extensive enterprise solution which offers more than just Identity Verification. It enables users to quickly and efficiently verify their identity, with rapid response times of 40 seconds or less. This verification journey is captured in a video clip, which is then provided to the Client to review. This video clip displays each step the user took during the verification process, including the ID documents and webcam interaction. In addition, Shufti Pro also provides a downloadable report containing complete verification data, such as KYC logs, user information, time stamps and comments. This report can be used to submit to banks, release payments or for creating a backlog. The comprehensive Shufti Pro solution is designed to make the verification process simple, secure and efficient.

Read more Read less

Shufti Pro Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    92%
  • Reviews
    86%
  • Momentum
    71%
  • Popularity
    84%

User Sentiment

  • Fast Verification Process, Easy to Use
  • Unclear Instructions, Issues with Document Acceptance
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

389 Directory Server logo
"389 Directory Server: Vital network asset" Write a Review
View Details + Add to Compare

What is 389 Directory Server and how does it work?

The 389 Directory Server is an essential resource for any professional network. Developed by the reliable Red Hat team, customer can be sure that the 389 Directory Server will support the customers business operations in a secure, flexible and highly scalable way. Designed specifically to provide robust Lightweight Directory Access Protocol (LDAP) services, it boasts unmatched performance and scalability, making it an ideal solution for larger organizations needing to store and manage even more data. The "389" name originates from the port number that it uses when handling LDAP requests, which makes for an easier integration into existing infrastructures. With its intuitive system administration console, customers are guaranteed a user-friendly operational experience. It's also open source software, meaning customizations are easily made, with extensive online documentation to guide the customer through any setup or configuration efforts needed. Let the 389 Directory Server to go-to the solution for LDAP server needs today!

Read more Read less

389 Directory Server Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    89%
  • Reviews
    60%
  • Momentum
    65%
  • Popularity
    66%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
Account Security Solutions To Manage Identity Life Cycles 4.7 Based on 19 Ratings
View Details + Add to Compare

What is CyberArk Conjur and how does it work?

CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets.

Read more Read less

CyberArk Conjur Pricing

  • Free Trial Not Available

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    80%
  • Reviews
    71%
  • Momentum
    63%
  • Popularity
    69%

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Core Access Insight logo
Intelligent analytics to address immediate threats 4 Based on 1 Ratings
View Details + Add to Compare

What is Core Access Insight and how does it work?

Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business.

Read more Read less

Core Access Insight Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

PeoplePlatform logo
A tool to automate and delegate identity management 4.9 Based on 19 Ratings
View Details + Add to Compare

What is PeoplePlatform and how does it work?

PeoplePlatform empowers an organization to handle the tasks associated with Identity Management through a simple web interface. You can control the access to your organization’s resources via single and bulk provisioning and deprovisioning. It can also handle workflows to automate jobs that can scheduled to run after a provisioning. Role based security lets you provide different access to the different sets of people. It supports multiple platforms and lets you simultanously provision objects into Active Directory, G Suite and Azure Active Directory. Admins can set the monitoring on so that there’s an approval process in place to accept changes. Other important features of PeoplePlatform include Custom Form Builder, Notification changes, Active Directory Reports, Business Rules Management etc. Now simplify the access management in your organization with a simple web interface powered by PeoplePlatform.

Read more Read less

PeoplePlatform Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    92%
  • Reviews
    73%
  • Momentum
    60%
  • Popularity
    61%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Teleport Desktop Access logo
A single Access Plane for mixed environments Write a Review
View Details + Add to Compare

What is Teleport Desktop Access and how does it work?

Identity-based, passwordless access to Windows hosts across all cloud, on-premises, and edge environments. Upgrade your entire Windows fleet to security best practices, including SSO, MFA, and passwordless just-in-time access via short-lived certificates. Teleport provides a secure, passwordless login experience to Windows machines using your favorite hardware device.

Read more Read less

Teleport Desktop Access Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    90%
  • Reviews
    60%
  • Momentum
    61%
  • Popularity
    62%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Bare.ID logo
Highly Secure Single Sign On SaaS Write a Review
View Details + Add to Compare

What is Bare.ID and how does it work?

Bare.ID stands for user-friendly identity and access management in the cloud. With Bare.ID you can connect digital business processes and applications to a local user directory and benefit from centralized security and single sign-on.

Read less

Bare.ID Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    84%
  • Reviews
    60%
  • Momentum
    61%
  • Popularity
    68%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

IDHub logo
Right Access, for Right People, to Right Systems Write a Review
View Details + Add to Compare

What is IDHub and how does it work?

IDHub is a fully customizable, flexible, and user-friendly IAM solution. We know managing a highly technical IAM system can be challenging. However, convincing users how and why to use it is often as difficult. After nearly two decades of IAM experience, we designed IDHub with the needs of users and administrators in mind, for the best in usability, functionality, and customization, to make your jobs easier. We constantly expand our extensive training videos and easy read documentation, to make using and managing IDHub as easy as possible. Get expert-level support from veteran IAM professionals, with plans up to 24/7/365. We believe IAM processes should be incredibly fast. Our fail fast, recover faster model, allows businesses to launch and deploy complete systems and updates within hours and days, not weeks and months.

Read more Read less

IDHub Pricing

  • Free Trial Available
  • Starts at $25.0.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    60%
  • Momentum
    60%
  • Popularity
    63%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ForgeRock Identity Platform logo
For All Your Identity Concerns 4.6 Based on 33 Ratings
View Details + Add to Compare

What is ForgeRock Identity Platform and how does it work?

ForgeRock Identity Platform is an AI-powered comprehensive identity management solution that offers full-suite IAM and IGA services. Enterprises get to monitor multiple risks, grow revenues, and enhance the productivity levels of their workforce using the wide variety of features offered by the software. With machine learning and artificial intelligence, the system helps corporate entitlement market be more visible, actionable, and predictable. It is an all-in-one solution for business houses, ensuring identity and security provisions, consistently across APIs, microservices, and applications. The software offers dynamic services, including scalability, open standards, and contextual security, allowing enterprises to meet IOT-level security demands. It serves as an identity gateway, enabling users to enforce security measures and bridge identity gaps across multiple business apps and APIs. With the inclusive directory service, enterprises can manage huge transactions and implement the latest privacy and security measures. The solution development kits offered by ForgeRock Identity Platform, enables developers embed identity within the mobile or web app they are working on, and receive device telemetry, facilitating enhanced decision making.

Read more Read less

ForgeRock Identity Platform Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    89%
  • Reviews
    81%
  • Momentum
    60%
  • Popularity
    62%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

DID logo

DID

Go passwordless only with DID Write a Review
View Details + Add to Compare

What is DID and how does it work?

DID is an ideal passwordless authentication solution designed for websites and apps that assists users in maximum ways. Users can sign into this software with just a click, and using a private key, which is stored securely on their device. This unique Identity Provider is extremely safe, fast and simple to use, and one can begin working on it just by creating a new account. With the help of DID, one can easily handle all new onboarding users and recover the account from their old and lost devices using the secure magic links. On the other hand, users do not have to enter any password nor try any alternative way to log into the account. The software supports OpenID connect protocol and integrates easily with several platforms, web and other natives. Additionally, it provides a customizable user interface, where one can add the required details and make this platform perfect for use anytime.

Read more Read less

DID Pricing

  • Free Trial Available
  • Starts at $29.00. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    76%
  • Reviews
    60%
  • Momentum
    63%
  • Popularity
    63%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Akku logo
Reimagine your operations on your journey 4.7 Based on 10 Ratings
View Details + Add to Compare

What is Akku and how does it work?

Akku strengthens the operations and gives you control over compliance, risk control, visibility, and costs, along with better insights for informed decision making. Even as users adjust to the dynamic way of work the ‘new normal’ demands, ser are trying to regain control. Users are struggling with soaring operational costs. There is limited visibility to people and processes, and this is affecting decision making.

Read more Read less

Akku Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    70%
  • Momentum
    61%
  • Popularity
    70%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Avatier Identity Anywhere logo
Get identity monitored in a safe and secure manner 4.8 Based on 70 Ratings
View Details + Add to Compare

What is Avatier Identity Anywhere and how does it work?

Avatier Identity Anywhere is a world-class identity management solution for enterprises, enabling them to mitigate individual risks with maximum convenience and control. The software features a native login mechanism, eliminating dual administration. A rollback feature within the particular ensures that users can always get back to previous versions of an individual document as per their business needs. Avatier Identity Anywhere ensures high-class security by saving business-relevant data in an encrypted format without co-mingling. Delegated System Administration feature within the particular, enables admins to control access rights, related to making changes within user identity mapping files. The software also sends on-time notifications when an unauthorized person makes changes within the identity database of an enterprise. Tamper detection technology assures accurate data monitoring and storage. Further, admins can also monitor important actions related to password resets and enrollment using the particular platform. They can exclude accounts, suppress confirmation based emails and deny access to passwords.

Read more Read less

Avatier Identity Anywhere Pricing

  • Free Trial Available

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    83%
  • Momentum
    61%
  • Popularity
    77%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Alibaba Resource Access Management logo
Management of Resource Access 4.4 Based on 5 Ratings
View Details + Add to Compare

What is Alibaba Resource Access Management and how does it work?

Alibaba Cloud Resource Access Management (RAM) is a user management and access control solution that allows you to centrally manage your users (including personnel, systems, and applications) and securely regulate their access to your resources via permission levels. As a result, RAM enables you to securely provide Alibaba Cloud resource access permissions to only your chosen high-privileged users, enterprise professionals, and partners. This ensures that your cloud resources are used safely and appropriately, as well as preventing unauthorized access to your account. RAM enables you to control access to Alibaba Cloud services and resources from a single location. RAM users and user groups can be created and managed using RAM. You can also give RAM individuals and user groups authorization to limit their access to cloud resources. You can manage different user identities and issue permissions for resource access with Alibaba Cloud Resource and Access Management (RAM). Alibaba Cloud RAM's major function is to assign and manage an access lifecycle for each product deployment for an organization by keeping digital identities. An overview of Alibaba Cloud Resource and Access Management (RAM) will be provided in this post.

Read more Read less

Alibaba Resource Access Management Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    91%
  • Reviews
    73%
  • Momentum
    62%
  • Popularity
    63%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

IBM Security Verify Access logo
Securely simplify user access 3.3 Based on 32 Ratings
View Details + Add to Compare

What is IBM Security Verify Access and how does it work?

IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, helps user simplify users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. Verify Access helps user strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with Verify Access.

Read more Read less

IBM Security Verify Access Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    75%
  • Momentum
    60%
  • Popularity
    62%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SAASPASS logo
Full Stack Identity and Access Management Solution 3.7 Based on 3 Ratings
View Details + Add to Compare

What is SAASPASS and how does it work?

SAASPASS provide the world's easiest to use End to End on-demand identity and access management for enterprises. A single solution for Digital & Physical Security, On-premise & Cloud, Offline and Online Multifactor Authentication.

Read less

SAASPASS Pricing

  • Free Trial Available
  • Starts at $10.00. Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    84%
  • Reviews
    66%
  • Momentum
    75%
  • Popularity
    81%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Login-Master logo
For those who expect more Write a Review
View Details + Add to Compare

What is Login-Master and how does it work?

Nothing works on the Internet today without login, access and identity management functionalities. This is often seen as a side issue. But it is all the more important to ensure the safety of customers and partners. Keycloak is now completely in line with the open source idea. Extensions to complete and secure the administration and maintenance of personal data.

Read more Read less

Login-Master Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    76%
  • Reviews
    60%
  • Momentum
    61%
  • Popularity
    64%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Lumos logo
Make Your Organization Secure, Compliant & Productive 4.9 Based on 51 Ratings
View Details + Add to Compare

What is Lumos and how does it work?

Lumos simplifies the access process for companies. It is an internal AppStore that helps to automate access requests, reviews and license management. This self-service platform helps to reduce the number of support tickets and makes access requests and approvals faster and more efficient. Lumos provides visibility into SaaS applications and spend, and also enables automated workflows for removing unused licenses. It is an ideal platform for companies looking to streamline their access process and reduce manual workload. Additionally, it helps to improve security and compliance as well as provides an overview of all applications used in the organization. Lumos provides an efficient and secure way for companies to manage their access requests and licenses.

Read more Read less

Lumos Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    73%
  • Reviews
    73%
  • Momentum
    69%
  • Popularity
    75%

User Sentiment

  • User-Friendly Interface, Automated Access Provisioning
  • Limited Third-Party App Integrations, Occasional Software Bugs
View Details
ARCON PAM logo
Protect your data and privacy using an advanced security system 4.7 Based on 26 Ratings
View Details + Add to Compare

What is ARCON PAM and how does it work?

ARCON PAM is a privileged access management software that puts users’ data security and privacy protection on the top of its priority list. The software offers a host of fine-grained access control facilities for implementing a practice of privileged access on a ‘need-to-do basis’ and ‘need-to-know’ facility. An integrated feature like password vaulting, assures additional protection with an automatic and secured password changing process, besides randomizing privileged passwords in an instant. Users can use the software to mitigate risks and spot threats in real-time, securing their privileged access environment. With ARCON PAM, they can also allow one-time secure access to critical systems without sharing any privileged credentials. The platform offers appropriate assistance in reducing the surface of threats, by eliminating standing privileges to applications and systems. An in-built multi-factor authentication option empowers users to implement a powerful validation technology of their own, preventing unauthorized access. Furthermore, ACRON PAM offers access to audit trails, besides analytical tools and reports that help users improve their decision-making ability.

Read more Read less

ARCON PAM Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ZITADEL logo
Ensure secure login for your projects using Zitadel Write a Review
View Details + Add to Compare

What is ZITADEL and how does it work?

Zitadel is an identity experience platform that ensures secure login and access to your various projects with its smart and advanced tools. It provides the users with every tool required to create excellent solutions, without the necessity of generating the login and access management system all by themselves. With Zitadel’s authentication and authorization features that comply with well-established industry standards like OAuth 2.0. and OpenID Connect 1.0, you can integrate your project and create a customizable login for it. You can privately label your hosted login pages by bringing your brand design to Zitadel. It allows the feature of multiple identity linking to one account to its users and ensures secure authentication with two-factor authentication and phishing resistance. You can also quickly start your project and assign roles to your users using Zitadel’s role based access control (RBAC). Users get full transparency of their data and on-going process with Zitadel as they provide the option to review their security and trust centre. Zitadel is an open source software and you can fully own your data with it apart from contributing to its discussions and makings.

Read more Read less

ZITADEL Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    60%
  • Momentum
    62%
  • Popularity
    73%

User Sentiment

Not Enough Reviews!

Write a Review
View Details

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed