Alternatives to IDM365
Compare IDM365 alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IDM365 in 2026. Compare features, ratings, user reviews, pricing, and more from IDM365 competitors and alternatives in order to make an informed decision for your business.
-
1
Frontegg
Frontegg
Frontegg is a Customer Identity and Access Management (CIAM) platform that simplifies authentication, authorization, and user management for SaaS companies. It enables developers to implement advanced identity features quickly, then shift ongoing administration to other teams. With Frontegg, Product, Infosec, and Customer Success teams can take control of key identity tasks like managing user roles, enforcing security policies, and handling customer requests, all without engineering support. Developers reduce toil and regain focus on core product work, while stakeholders move faster without bottlenecks. Frontegg supports modern identity features including SSO, MFA, role-based access control, entitlements, multi-tenancy, and audit logs. Its low-code platform integrates in days and provides a user-friendly admin portal that bridges technical and non-technical teams. Frontegg increases operational efficiency, improves security posture, and enhances the customer experience. -
2
Cisco Duo
Cisco
Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.Starting Price: $3 per user per month -
3
SecurEnds
SecurEnds
SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations. -
4
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
5
JumpCloud
JumpCloud
JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.Starting Price: $9/user -
6
Omada Identity Suite
Omada
Omada is a global leader in IGA, offering innovative, user-centric solutions to manage and secure digital identities. Omada Identity Cloud delivers a simplified, yet powerful IGA experience leveraging intelligent automation and Gen AI/ML capabilities to enhance security, compliance, and efficiency. Omada empowers organizations with advanced analytics and comprehensive visibility, enabling informed decisions about access rights and identity management. By automating key processes, Omada helps businesses reduce risk exposure, optimize operations, and maintain compliance while streamlining administration to reduce IT costs and improve overall security posture. With Omada, organizations can effectively manage modern identity challenges, ensuring the right people have the right access to the right resources at the right time. -
7
Oracle Identity Management
Oracle
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service. -
8
Visual Guard
Novalys
Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management costStarting Price: 1.55/month/user -
9
CzechIDM
BCV solutions
IT department is typically snowed under with routine requests having to do with account management: manual account creation, password resetting, auditing work, long-inactive accounts. Often, there is no accounting for who has got access and where. We help our customers to automate their routine processes, centralize information systems, delegate account management to business owners, and keep transparent evidence of granted permissions. Identity Management (IdM) is all about centralizing identity and access management within IT systems. It enables the right persons to gain access to the right kind of data sources, at the right time, for the right reasons, and most importantly, with reliable evidencing records on hand. We help companies to improve Identity and Access Management. Our aim is to make companies safer and more efficient by simplifying user management across companies’ systems. -
10
Alibaba Cloud IDaaS
Alibaba Cloud
Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud. -
11
Microsoft Identity Manager
Microsoft
Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors. -
12
One Identity
Quest Software
Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements. -
13
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management is a comprehensive solution in the areas of IAM (Identity and Access Management) and CIAM (Customer Identity and Access Management). The different modules of this platform include Single Sign-On (SSO), Multi-Factor Authentication (MFA or 2FA), Adaptive Authentication, Directory Services, Lifecycle Management. Ask, capture and safely store information about the user’s consent during their registration process. Manage terms of the service lifecycle, prompting the user to accept new terms when necessary. Track all changes for consents, permissions and terms of service. This feature helps your business comply with regulations such as GDPR. Set up forms to gradually capture data from users in different moments of their journey (on first contact, after the nth login, coupon redeeming). With this technique, you avoid overwhelming customers with long forms during their registration process but still get the chance to progressively build their profile. -
14
WALLIX Trustelem
WALLIX Group
WALLIX Trustelem is designed to make administration simple and intuitive. The web-based administration console enables IT staff to easily set up directory synchronization, manage life cycles of external user accounts and applications, create and adapt access rules, monitor activity, and audit access security. Keep control over your identities and data! The WALLIX Trustelem platform is hosted and operated by a trusted European cloud provider. Your data sovereignty and security are essential to ensure quality of service and to protect your company’s assets. Trustelem is designed for simplicity of user experience and administration, in both build and run phases. Security is at the heart of Trustelem's infrastructure, software and operations. -
15
RSA SecurID
RSA Security
RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity. -
16
Google Cloud Identity
Google
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.Starting Price: $6 per user per month -
17
Garancy IAM Suite
Beta Systems Software
The best-fit identity management solution for dynamic companies. What makes identity management particularly challenging today is the increasing dynamic nature of business operations across the board. The IT landscape is subject to ongoing changes and growth in terms of IT systems and applications. New legal provisions and intensive audits have a major impact on compliance-related concerns. Both users and user types change constantly. Today’s business is characterized by frequent restructuring, acquisitions and international operations – and these dynamics require companies to run highly flexible organizations that can keep stride with all this change. In addition, business pressures call for solutions that support digital transformation and Industry 4.0. Beta Systems identity and access management solutions bring maximum flexibility to dynamic companies. Fully covers all compliance requirements by integrating governance and provisioning in a single IAM system. -
18
OpenText IAM
OpenText
Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. With OpenText IAM in place, information access becomes manageable, governable and visible. Identity and access management creates and manages user accounts, roles and access rights for individual users, systems and devices. The best IAM solutions manage both employee identities within an organization and across an extended business ecosystem of customers and partners. IAM is also essential to manage the identities of IoT devices. -
19
FortiAuthenticator
Fortinet
FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations. -
20
EmpowerID
EmpowerID
EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.Starting Price: $2 per user per month -
21
SecureIdentity IAM
SecurEnvoy
SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity. -
22
IAM Cloud
IAM Cloud
IAM Cloud’s world-leading drive management tool for cloud storage. It provides secure direct access (no sync) to OneDrive for Business, MS Teams and SharePoint Online. Great for desktop and VDI environments alike. Our simple & secure sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, and basic identity sync & provisioning from Active Directory. Everything you need from an SSO solution without the premium price. IAM Cloud is an identity company at heart. With IDx you can connect & sync identities across all kinds of systems, allowing the full automation of the Joiner, Mover and Leaver process. IDx integrates with on-prem, cloud and custom-built HR, ERP, CRM, MIS & Directory systems. Cloud-based data migrator. Supports to-the-cloud and from-cloud-to-cloud migrations for Office 365. Merge multiple Office 365 tenancies into one tenant. Split tenancies.Starting Price: $2.40 per month -
23
Syteca
Syteca
Syteca — control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start. The platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process). Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments. Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole. -
24
ManageEngine AD360
Zoho
AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.Starting Price: $595.00 / year -
25
Defakto
Defakto
Defakto secures every automated interaction by issuing short-lived, verifiable identities to non-human actors such as services, pipelines, AI agents, and machines, eliminating static credentials, API keys, and standing privileges. Their unified non-human identity and access management solution enables discovery of unmanaged identities across cloud, on-premises, and hybrid environments, issuance of dynamic identities at runtime tied to policy, enforcement of least-privilege access, and full audit-ready logging. The product consists of modules; Ledger for continuous discovery and governance of non-human identities; Mint for automated issuance of purpose-bound, ephemeral identities; Ship for secretless CI/CD workflows where hard-coded credentials are removed; Trim for automatic right-sizing of access and removal of over-privileged service accounts; and Mind for securing AI agents and large-language models with the same identity model used for workloads. -
26
Symantec IGA
Broadcom
While user experience and instantaneous access to data and services have become the norm, the IT infrastructure that supports these efforts has grown exponentially larger and more complex. In addition, IT organizations are facing ongoing pressures to reduce operational expenses while also maintaining compliance with a growing list of industry and governmental regulations. The end result is an IT organization that must give more people more access to disparate applications in less time, all the while, remaining accountable to a flood of parties governing said access. Today's identity governance and administration technologies must be able to provide broad provisioning support for on-premises and cloud apps, as well as entitlements certification to certify that privileges are appropriate, all while scaling to store millions of user identities. -
27
Amazon Cognito
Amazon
Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Amazon Cognito scales to millions of users and supports sign-in with social identity providers, such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0. Amazon Cognito User Pools provide a secure user directory that scales to hundreds of millions of users. As a fully managed service, User Pools are easy to set up without any worries about standing up server infrastructure. With Amazon Cognito, your users can sign in through social identity providers such as Google, Facebook, and Amazon, and through enterprise identity providers such as Microsoft Active Directory via SAML. Amazon Cognito User Pools is a standards-based Identity Provider and supports identity and access management standards, such as Oauth 2.0, SAML 2.0, and OpenID Connect. HIPAA eligible and PCI DSS, SOC, ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and ISO 9001 compliant. -
28
Josys
Josys
Josys is the Automated Identity Governance and Administration (IGA) Platform designed to simplify how IT works. Trusted by IT teams and Managed Service Providers (MSPs), Josys delivers complete visibility and control over every user, application, and access permission within their identity perimeter. By automating critical workflows, including access review audits, lifecycle management, shadow IT detection, and license optimization, Josys transforms complex access policies and governance into seamless, autonomous processes that drastically reduce security risks, optimize spend, and unlock true operational efficiency.Starting Price: $100/mo -
29
iGRIFFIN
Secuve
iGRIFFIN is the solution for consolidated account and privilege management, also know as 'Identity and Access Management'. It provides consolidated account management, control over exploitable commands, access control, and user event audit, based on multi-factor authentication to check actual users by employing multi-factor authentication methods. Also it enables effective internal control over in-house systems to be made in effect by harnessing automated processes for application and approval in case of user access. Command control over a kind of exploitable commands, which should be prohibited to be used. The control is to be enforced in such a way that only authorized users through application/approval processes can be permitted to use exploitable commands. The control is to be enforced in such a way that only authorized users through application/approval processes should be permitted to access important data. -
30
Fischer Identity
Fischer International Identity
Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management. -
31
CyberArk Workforce Identity
CyberArk
Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity. Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline management of application access requests, creation of app accounts, and termination of access. Keep workers working, not logging in and out. Make intelligent access decisions based on AI-powered analytics. Enable access across any device, anywhere at just the right time. -
32
AppSmart Identity
AppSmart
Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices. -
33
SafeNet Trusted Access
Thales
SafeNet Trusted Access, Identity-as-a-Service. SafeNet Trusted Access is a cloud-based access management solution that makes it easy to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies. Businesses and organizations looking to accelerate the deployment of cloud services for end users encounter hurdles to efficiently managing online identities and access security, while ensuring user convenience and regulatory compliance. SafeNet Trusted Access simplifies user access to cloud services, streamlines cloud identity management, and helps eliminate password hassles for IT and users, while providing a single pane view of access events across your app estate to ensure that the right user has access to the right application at the right level of trust. -
34
HORACIUS IAM
e-trust
The agility of business processes directly depends on the management of access rights to systems, and choosing a platform for IAM Identity Management that guarantees the security of all access, applications and data is one of the most important strategic decisions that will reduce costs and risks, increasing the productivity of the entire company. After all, how do you ensure that all users in your organization have only the appropriate levels of access, applications, data and transactions? In addition, the IAM Identity Management platform can be integrated with the main Human Resources systems, synchronizing information and performing tasks vital to the smooth running of the business. The entire history of people's rights to the systems is managed, from the first access, at the time of admission, until the revocation of rights at the end of the link. -
35
RapidIdentity
Identity Automation
Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today! -
36
Microsoft Entra
Microsoft
Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution. -
37
Access Auditor
Security Compliance Corp
Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning. Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls. SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week. -
38
MonoSign
MonoFor
MonoSign is a comprehensive Identity & Access Management solution for enterprise level companies. Get Universal Directory, Single Sign-On, Adaptive MFA, Lifecycle Management and many more. MonoFor is standing today with MonoSign — one of the most powerful and quick-to-deploy Identity & Access Management software for enterprise level companies.Starting Price: $4/month/user -
39
Huawei IAM
Huawei Cloud
Create IAM users and groups and grant them permissions by using policies and roles, allowing or denying access to specific services and resources. Delegate a trusted HUAWEI CLOUD account or a cloud service to access your HUAWEI CLOUD resources based on assigned permissions. Establish a trust relationship between your existing identity system and HUAWEI CLOUD by creating a SAML-based or OpenID Connect–based identity provider or a custom identity broker. In this way, users in your enterprise can log in to HUAWEI CLOUD through single sign-on (SSO). You can require IAM users to complete identity authentication each time they log in or perform a critical operation. IAM allows you to create IAM users and authorize them to securely access your resources using their own username and password. IAM allows you to authorize another HUAWEI CLOUD account or a cloud service to access your resources based on assigned permissions. -
40
Core Security Access Assurance Suite
Core Security (Fortra)
As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance. Comprised of four industry-leading modules, our identity management software offers the most intelligent and efficient path to mitigating identity risk, and provides a complete solution for streamlining the provisioning process, reviewing access requests, managing compliance, and enforcing robust password management. A convenient web portal where end users can request access and managers can review, approve, or deny access. Using a shopping cart approach, Core Access delivers an efficient and user-friendly experience, replacing paper forms, emails, and tickets used to manage access. -
41
NdSecure
Ndende Technologies
NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthnStarting Price: $8/month/user -
42
Aembit
Aembit
Replace manual and insecure access to non-human identities with our automated and secretless Workload IAM platform. Manage your workload-to-workload access like you do your users: with automated, policy-based and identity-driven controls, so you can proactively eliminate the risk of non-human identities. Aembit boosts security by cryptographically verifying workload identities, in real time, ensuring that only trusted workloads have access to your sensitive data. Aembit injects short-lived credentials into requests just-in-time so you never have to store or protect secrets. Dynamically enforce access rights based on real-time evaluations of workload security posture, geography and other key behavioral characteristics. Aembit secures access amongst workloads in the cloud on-prem and in SaaS. -
43
Infisign
Infisign
Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.Starting Price: $4/user/month -
44
Silverfort
Silverfort
Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies. -
45
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
46
Passly
IDAgent
Growing numbers of remote workers, increased dependency on cloud applications, and explosive increases in cyber theft should require every organization of every size to consider Secure Identity & Access Management. With Passly™ from ID Agent (a Kaseya company), IT teams can easily, simply, and affordably enable the right people to have the right access to the right resources – all from the right devices and locations. Secure Password Management, Single Sign-On, Multi-Factor Authentication and more. In a time when the threat of cyberattack has never been greater, and with nearly 80% percent of all data breaches due to lost, weak or stolen passwords, it’s critical to select the right secure identity & access management platform. Passly provides the most comprehensive and cost-effective solution to enable security, compliance, and efficiency. Shared Password Vaults allow techs to manage and store passwords for business, personal or shared accounts. Centralized and easy to use. -
47
SIVIS Identity Manager
SIVIS
A high number of identities and authorizations means a high amount of effort – especially if they have to be administered manually by the employees. Using the right IAM tool (Identity and Access Management Tool) supports you with the administration and relieves your employees. The SIVIS Identity Manager automates and simplifies the recording, control and administration of users and the associated access rights and approval processes. A clean definition of workflows allows processes to be implemented and easily mapped in very complex system landscapes. With the SIVIS Identity Manager you can easily perform mass changes. Quickly and easily add or remove new attributes such as roles in the destination system for any number of users. Administration with a thorough authorization concept, visibility and responsibilities within the SIVIS Identity Manager. You can also define an individual confirmation strategy and implement a two-man rule. -
48
TozID
Tozny
An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more. Here are a few key features we think you’ll love! Administrators have the keys to the kingdom. Moving to zero-trust means protecting admin accounts from hacks and malicious insiders. Tozny's Privileged Access Manager (PAM) is built directly into our single sign-on solution. Get advanced protection for any endpoint and any 3rd party with Tozny PAM. -
49
Hire2Retire
RoboMQ
RoboMQ’s Hire2Retire is a comprehensive workforce lifecycle management solution that manages the entire JML lifecycle events, such as hiring, department transfers, terminations, and long-term leaves. It is an Identity and Access Management platform that synchronizes HR with IT infrastructure, including Active Directory (AD), Okta, and Google Workspace. Hire2Retire enables organisations to effectively manage employee access and privileges throughout their work cycle. Hire2Retire integrates with 27 HR and ATS systems, identity providers (IdP) like Active Directory, Entra ID, Okta, and Google Workspace, along with 10+ leading Service Management platforms like ServiceNow, Salesforce, SolarWinds, and FreshService.Starting Price: $5/month/employee -
50
RAC/M Identity
OKIOK Data
RAC/M Identity™ is a simple, effective, IGA solution that enables organizations large and small to understand and manage the complex relationships between users and their access to physical and digital assets, whether on-premises or in the cloud. It is the cornerstone upon which to build a successful IAM program capable of taming your most daunting challenges such as lack of resources, limited budgets, strict timelines, complex technological and business landscape. RAC/M Identity™ also addresses one of the most difficult challenges faced by IAM programs, maintaining executive support. It automatically generates a composite health score that reflects the maturity and effectiveness of key IAM processes, enabling executive management to assess progress made as well as the remaining road ahead on the journey. Risk is reduced by continuously identifying and remediating risky situations such as orphaned and rogue accounts, enforcing SOD rules as well as quickly revoking unnecessary access.