Alternatives to XYGATE Identity Connector

Compare XYGATE Identity Connector alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to XYGATE Identity Connector in 2026. Compare features, ratings, user reviews, pricing, and more from XYGATE Identity Connector competitors and alternatives in order to make an informed decision for your business.

  • 1
    Passwork

    Passwork

    Passwork

    Passwork is an on-premise corporate password manager built for security-conscious organizations. Developed and headquartered in Europe (Barcelona, Spain), Passwork meets GDPR, NIS2, ENS and other European regulatory requirements by design. All passwords and credentials are stored exclusively on your own server. Double-layer AES-256 encryption (server-side and client-side) with zero-knowledge architecture means your data stays within your infrastructure, fully under the control of your system administrators. Passwork is ISO/IEC 27001 certified. Your data never leaves your infrastructure. Trusted by enterprises for secure password sharing, privileged access management, & centralized credential governance.
    Compare vs. XYGATE Identity Connector View Software
    Visit Website
  • 2
    Securden Password Vault for Enterprises
    Securden Password Vault for Enterprises is a scalable, enterprise-grade credential management solution available in both cloud (SaaS) and on-premise deployments. It centralizes the storage of passwords, SSH keys, DevOps secrets, files, and other sensitive data in an AES-256 encrypted vault, helping organizations enforce strong security controls and defend against insider and external threats. The solution enables secure credential storage, granular access controls, automated password rotation, and just-in-time access while providing full visibility through audit logs, session recordings, and real-time alerts. IT teams can launch secure remote connections such as RDP, SSH, and SQL directly from the vault without exposing credentials. Trusted by enterprises worldwide, Securden helps organizations strengthen security posture, streamline credential governance, improve operational efficiency, and meet compliance requirements across industries.
    Compare vs. XYGATE Identity Connector View Software
    Visit Website
  • 3
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 4
    Beyond Identity

    Beyond Identity

    Beyond Identity

    Beyond Identity is fundamentally changing the way the world logs in–eliminating passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible, passwordless MFA platform enables companies to secure access to applications and critical data, stop ransomware and account takeover attacks, meet compliance requirements, and dramatically improve the user experience and conversion rates. Our revolutionary zero-trust approach to authentication cryptographically binds the user’s identity to their device, and continuously analyzes hundreds of risk signals for risk-based authentication.
    Starting Price: $0/ User/ Month
  • 5
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. Trusted by over 250 global customers, Zluri is committed to delivering innovative, reliable, and scalable solutions that empower organizations to optimize their SaaS usage, ensure compliance, and enhance Access Management practices.
  • 6
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 7
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction with the products they’re supposed to work with. Most importantly, CNAPPs allow businesses to monitor the health of cloud native applications as a whole rather than individually monitoring cloud infrastructure and application security.
  • 8
    CimTrak Integrity Suite
    Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.
  • 9
    Symantec IGA
    While user experience and instantaneous access to data and services have become the norm, the IT infrastructure that supports these efforts has grown exponentially larger and more complex. In addition, IT organizations are facing ongoing pressures to reduce operational expenses while also maintaining compliance with a growing list of industry and governmental regulations. The end result is an IT organization that must give more people more access to disparate applications in less time, all the while, remaining accountable to a flood of parties governing said access. Today's identity governance and administration technologies must be able to provide broad provisioning support for on-premises and cloud apps, as well as entitlements certification to certify that privileges are appropriate, all while scaling to store millions of user identities.
  • 10
    CyberArk Workforce Identity
    Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity. Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline management of application access requests, creation of app accounts, and termination of access. Keep workers working, not logging in and out. Make intelligent access decisions based on AI-powered analytics. Enable access across any device, anywhere at just the right time.
  • 11
    Privileged Access Management
    Secure your most sensitive accounts in minutes with Imprivata Privileged Access Management. Privileged accounts, those with the highest level of access, pose a greater security risk than the average end user because of the degree of sensitive information that could be exposed. This risk isn’t lost on hackers, which is why 80% of security breaches involve compromised privileged credentials. Legacy PAM solutions are complex and resource-intensive, often requiring costly engagements with outside consultants. Imprivata Privileged Access Management combines all the features of a traditional enterprise-grade solution but with zero clients and server footprint. Incorporate the principle of least privilege by providing just enough access to complete a task through granular policy control at the system level. Get going in just minutes with a completely agentless architecture that helps you meet wide-ranging compliance requirements quickly.
  • 12
    Cross Identity

    Cross Identity

    Cross Identity

    Cross Identity is a converged Identity and Access Management (IAM) platform designed to eliminate the security and complexity risks caused by traditional IAM point solutions. It unifies Access Management, PAM, IGA, CIEM, ISPM, and ITDR into a single, purpose-built architecture with shared genetics. By removing stitched integrations and fragile connectors, Cross Identity dramatically reduces attack surface and operational failure points. The platform delivers advanced risk intelligence through its OneBrain™ and Warchief™ engines, providing real-time user, application, and entitlement risk scoring. Cross Identity enables organizations to strengthen their security posture from day one while simplifying implementation and long-term maintenance. It is built to meet modern threat vectors without introducing new system complexity or downtime.
  • 13
    Intellisoft IDMS

    Intellisoft IDMS

    Intellisoft

    Intellisoft provides identity management and security solutions, most notably Intellisoft IDMS (Identity Management System), a credentialing and access control platform used by highly secure organizations, including major airports, the Pentagon, and Department of Defense facilities, to centralize and automate identity issuance, policy-based access rules, compliance reporting, and integration with physical/logical security systems. It unifies data from access control, background checks, and training systems into a single user-friendly interface to streamline security workflows, define complex business rules, automate card issuance, govern regulatory compliance, and manage multi-modal biometrics with a future-proof design and ongoing alignment with evolving security directives. Intellisoft emphasizes high reliability, robust information security (ISO/IEC 27001 and SOC 2 certified), and seamless integration of legacy and modern control systems.
  • 14
    Bravura Identity

    Bravura Identity

    Bravura Security

    Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. Users have too many login IDs. A typical user in a large organization may sign into 10 to 20 internal systems. This complexity creates real business problems. Bravura Identity manages the lifecycles of identities, accounts, groups and entitlements. It includes automation to grant and revoke access, after detecting changes on systems of record. A web portal for access requests, profile updates and certification. Full lifecycle management for groups and roles on target systems. A workflow manager to invite people to approve requests, review access or complete tasks. Policy enforcement related to SoD, RBAC, risk scores, privacy protection and more. Reports, dashboards and analytics.
  • 15
    Garancy IAM Suite

    Garancy IAM Suite

    Beta Systems Software

    The best-fit identity management solution for dynamic companies. What makes identity management particularly challenging today is the increasing dynamic nature of business operations across the board. The IT landscape is subject to ongoing changes and growth in terms of IT systems and applications. New legal provisions and intensive audits have a major impact on compliance-related concerns. Both users and user types change constantly. Today’s business is characterized by frequent restructuring, acquisitions and international operations – and these dynamics require companies to run highly flexible organizations that can keep stride with all this change. In addition, business pressures call for solutions that support digital transformation and Industry 4.0. Beta Systems identity and access management solutions bring maximum flexibility to dynamic companies. Fully covers all compliance requirements by integrating governance and provisioning in a single IAM system.
  • 16
    Sails

    Sails

    Sails

    Build practical, production-ready Node.js apps in a matter of weeks, not months. Sails is the most popular MVC framework for Node.js, designed to emulate the familiar MVC pattern of frameworks like Ruby on Rails, but with support for the requirements of modern apps, data-driven APIs with scalable, service-oriented architecture. Sails makes it easy to build custom, enterprise-grade Node.js apps. Building on top of Sails means your app is written entirely in JavaScript, the language you and your team are already using in the browser. Sails bundles a powerful ORM, Waterline, which provides a simple data access layer that just works, no matter what database you're using. Sails comes with blueprints that help jumpstart your app's backend without writing any code. Since Sails translates incoming socket messages for you, they're automatically compatible with every route in your Sails app. Sails offers commercial support to accelerate development and ensure best practices in your code.
  • 17
    SailPlay Loyalty
    Boost revenue with a customer loyalty and rewards program from SailPlay Loyalty. SailPlay offers a platform that enables B2C companies build customizable loyalty programs. With a flexible bonus points scheme for customers, built-in CRM system, single loyalty program for online and offline stores, plus a wide range of innovative features, SailPlay gives businesses a competitive advantage.
  • 18
    Assuric

    Assuric

    Assuric

    Assuric is an all-in-one AI-powered digital health compliance platform that helps healthtech companies and healthcare organizations automate and manage complex regulatory, data protection, clinical safety, and security requirements in one centralized system, reducing reliance on manual spreadsheets and fragmented tools. It guides users through comprehensive onboarding with gap analysis and documentation upload, then automates compliance tasks, policy and evidence creation, proactive alerts, and task tracking so teams can close gaps, maintain controls, and sail through audits and certifications with minimal friction. It supports multiple mandated frameworks including GDPR, NHS Digital Technology Assessment Criteria (DTAC), DCB0129 and DCB0160 clinical risk standards, ISO 27001 information security, and NHS Data Security & Protection Toolkit (DSPT), with structured workflows, templates, hazard logs, and automated reminders to reduce risk.
  • 19
    CyberArk Customer Identity
    Delight your customers with easy and secure access to your websites and apps that keep them loyal to your business. Expectations for great digital experiences are at an all-time high. Meanwhile, the attack surface is more porous than ever. With CyberArk Customer Identity, you can securely open up your websites and apps to customers with confidence. Seamless integration, intuitive access controls and frictionless sign-on experience. Privacy, consent and identity verification in one platform. Pre-built widgets and open APIs to reduce development effort. Secure access to business apps for human and machine identities. Secure access for machine identities within the DevOps pipeline. Reduce complexity and burden on IT while improving protection of the business. Provide secure single sign-on access to your apps and services.
  • 20
    Sail

    Sail

    Sail for WordPress

    Sail is a free and open source CLI tool to provision, manage and deploy WordPress applications in the DigitalOcean cloud. A great alternative to traditional shared and managed WordPress hosting for a fraction of the cost. Provision servers, create and restore backups, manage domains, DNS and SSL certificates, full root access, integrated performance profiling and much more. With Sail you can host WordPress on your own terms. No limits on number of installs, number of domains/subdomains, visits, inodes and other resources. WordPress Multisite is supported out of the box, simple and efficient page caching and security features implemented with every provisioned application.
  • 21
    Evo Security

    Evo Security

    Evo Security

    Eliminate credential sharing, establish powerful administrative permissions, mass deploy login security for your customers, and meet insurance and compliance requirements with Evo Security. EPIC is the next evolutionary step for MSPs, MSSPs, NOCs, and SOCs seeking to reduce credential sharing risk and secure logins for endpoints, network devices, and web applications all-in-one. The big secret about managed services is that MSP administrators are forced to share customer passwords and MFA codes internally. Password Managers and other Password Rotation tools offer sharing convenience with some iterative improvements, however ultimately propagate the same problem. With cybercriminals targeting MSPs more than ever, and regulation mandates demanding a better way, this involuntary poor practice has run its course. Easily accommodate managed or co-managed Customer scenarios when technicians and administrators need access to the Evo platform using the Evo Privileged Access Manager.
  • 22
    CionSystems

    CionSystems

    CionSystems

    Over 74% of all breaches involve access to a privileged account. The mass migration to remote workforce enterprise operations has created more security gaps and risks than ever before. Enterprise identity manager is an “out of the box” solution to dramatically harden, simplify, and secure enterprise Active Directory deployments, no scripts or code required. EIM enables swift transition of Active Directory to handle large remote workforces, with real-time tracking of all changes with defined notifications. Over 90% of enterprises, worldwide, run Active Directory. Cloud migration and synchronization is complex, resulting in major security gaps. Cloud Office 365 streamlines the arduous task of Internet user account management, dramatically reducing the time required for provisioning and de-provisioning users, providing real-time tracking of all changes, and dramatically reducing unused and untracked license costs.
  • 23
    Access Auditor

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning. Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls. SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week.
  • 24
    Authress

    Authress

    Rhosys

    Authress, Complete Auth API for B2B. Authentication & Authorization gets complicated quickly, even if it appears easy, there is a lot of hidden complexity in authorization, you don’t want to do it on your own. It takes time to get authorization right In simple cases, it takes an average software team 840 hours to implement authorization logic. As you add features to your application, this number grows rapidly. Without expertise, you leave your door wide open to malicious attacks. You risk compromising your user data, non-compliance with local regulations, and massive business losses. * Secure authorization API--Instead of building your own authorization logic, call our API * Granular permissions--Define multiple levels of access and group them by user roles. As granular as you want * Identity Provider integrations--Plug in any of your preferred ID providers with a simple API call. * SSO and full user management
    Starting Price: $1.10 per month
  • 25
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 26
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.
  • 27
    Sailes

    Sailes

    Sailes

    Saile specializes in AI-powered sales solutions, focusing on automating prospecting and engagement processes to enhance sales team efficiency. The platform utilizes advanced artificial intelligence to identify and engage potential clients, streamlining the sales pipeline and enabling a focus on closing deals. By automating repetitive tasks, Saile increases productivity and drives revenue growth for businesses. This innovative approach to sales automation positions Saile as a leader in the industry, helping companies adapt to the evolving digital sales landscape.
  • 28
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 29
    Locurity

    Locurity

    Locurity

    Locurity provides patent pending 360 degree security platform using 'zero trust' security model that continuously defends this new enterprise ‘identity perimeter’. Identity is the new enterprise perimeter, protect it now. Defend against 81% of all cyber attacks. Security breaches often start with compromised identity (Verizon DBIR). Detect cyber attacks proactively. Protect before attacks turn to breaches. Secure your enterprise assets. Prevents numerous identity/credential borne attacks such as - phishing, whaling, hacking, guessing, brute forcing, scraping, social engineering, keylogging, ATO, credential stuffing etc. Decentralized architecture - no honeypot of identity crown jewels. Increase productivity while minimizing cost of login/password/access related helpdesk tickets. Email, VPN, SaaS (Office365, GSuite, Salesforce, BOX, Slack...), Healthcare/Finance apps and many more. Biometric (TouchID/FaceID), Pin/Pattern and elliptic curve cryptography based multi factor authentication.
  • 30
    Jamf Connect
    In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.
    Starting Price: $2 per user per month
  • 31
    Scanovate B-Trust
    The design and approval processes of new products in financial services companies can be burdensome due to cumbersome and inefficient internal processes. B-Trust provides a flexible web-based workflow engine to streamline and standardize discussions and approval steps across departments. Apps from our marketplace can support business users by automating the identification of potential risks, for example checking appropriate commission rates. Benefit from a complete identity suite including state-of-the-art onboarding technology. Track the identity lifecycle, managing onboarding, continuance verification, identification and more. Monitor compliance in real-time through key risk indicators and key performance indicators. Integrate with systems of record and third party supply chain through API-first design.
  • 32
    Axys

    Axys

    RedSail Technologies

    Axys® is the first cloud-based pharmacy management system created for long-term care. Having modern technology is an undeniable advantage as the healthcare industry changes; our software will strengthen your business and prepare your pharmacy for the future. Axys offers distinct benefits like fast updates, low-cost scaling, and security. Easy to learn, Axys pharmacies benefit from their investment with a lower total cost of ownership. Configurable workflow won't force changes to how you do business; smart design will save you time. Boost processes with integration to content and delivery management. Gain visibility into operations for superior data insights and better decision-making. Axys is a product of RedSail Technologies®. RedSail customers are supported with integrated products, 24/7 emergency support, regulatory updates, ongoing product enhancements, and access to clinical programs that improve health outcomes and grow their business.
  • 33
    Core Security Access Assurance Suite
    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance. Comprised of four industry-leading modules, our identity management software offers the most intelligent and efficient path to mitigating identity risk, and provides a complete solution for streamlining the provisioning process, reviewing access requests, managing compliance, and enforcing robust password management. A convenient web portal where end users can request access and managers can review, approve, or deny access. Using a shopping cart approach, Core Access delivers an efficient and user-friendly experience, replacing paper forms, emails, and tickets used to manage access.
  • 34
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 35
    One Identity

    One Identity

    Quest Software

    Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements.
  • 36
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 37
    uRISQ

    uRISQ

    uRISQ

    CSR Privacy Solutions Inc (CSR) is the world’s largest provider of privacy regulator compliance solutions for the small to medium business population. CSR’s team is comprised of experienced and certified privacy and security professionals. CSR's uRISQ cyber-privacy platform streamlines and documents your client’s compliance with mandated regulations, giving them peace of mind. Provides your clients with the peace of mind that every party is being notified and the right procedures are being performed to make sure all regulations are being met. Saves time and cost preventing the loss of extra revenue and time of operations. Reduces the risk of civil and/or criminal penalties due to incorrect reporting. Failure to properly report breaches leads to fines and criminal penalties. Offers a single point of contact to simplify the process of communication. Provides a key part of your incident response plan, allowing your clients to have all the necessary tools and plans of action.
  • 38
    Netwrix GroupID
    The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector.
  • 39
    CoreOne Suite
    CoreOne Suite is an identity and access management software for medium and large enterprises. CoreOne Suite can be used in enterprise IAM and customer IAM environments. CoreOne Suite is a Swiss Identity and Access Management software for Enterprise IAM and Customer IAM solutions. Unique IT operations management functionalities extend the reach of identity and access management for greater efficiency, security and convenience. With CoreOne Suite, organizations can achieve sustainable compliance and reduce risk. The compliance requirements are becoming more and more extensive and demanding. The CoreOne Suite offers standardized procedures so that they comply with data protection regulations such as the GDPR or the requirements of the Payment Card Industries (PCI).
  • 40
    DeliveryTrack

    DeliveryTrack

    RedSail Technologies

    DeliveryTrack® is pharmacy delivery software designed to manage logistics – from item validation and route optimization to signature capture and real-time delivery confirmation. It’s built for convenience, so choose your device. Available for iOS and Android™. Use it to increase compliance, reduce audit risks, and maximize accountability. Interfaces include pharmacy management systems, automated packaging vendors, UPS®, FedEx®, and DocuTrack®. DeliveryTrack is a product of RedSail Technologies®. Customers are supported with integrated products, 24/7 emergency support, nationwide hardware maintenance, regulatory updates, ongoing product enhancements, and access to an advantage network of clinical programs that improve health outcomes and grow their business.
  • 41
    Core Access Insight
    Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business. With Access Insight, your governance system does more than just manage access. It provides access intelligence to analyze the identity and access data in your organization, using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization—drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders.
  • 42
    Clutch

    Clutch

    Clutch

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies.
  • 43
    Ruleguard

    Ruleguard

    Ruleguard

    Ruleguard is a leading RegTech platform that empowers financial services firms to streamline their risk and compliance processes. By combining advanced technology with deep regulatory expertise, Ruleguard helps firms effectively manage their obligations under complex frameworks such as CASS, SM&CR, financial crime rules, and broader risk and compliance mandates. Designed for adaptability and scalability, Ruleguard offers out-of-the-box solutions that reduce operational inefficiencies, minimise risk leakage, and align seamlessly with ever-evolving regulatory changes. The platform's intuitive interface allows firms to centralise compliance workflows, automate key processes, and generate actionable insights, ultimately saving time and resources during audits and regulatory reporting.
  • 44
    Google Cloud Identity and Access Management (IAM)
    Fine-grained access control and visibility for centrally managing cloud resources. Identity and Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage Google Cloud resources centrally. For enterprises with complex organizational structures, hundreds of workgroups, and many projects, IAM provides a unified view into security policy across your entire organization, with built-in auditing to ease compliance processes. We recognize that an organization’s internal structure and policies can get complex fast. Projects, workgroups, and managing who has authorization to do what all change dynamically. IAM is designed with simplicity in mind: a clean, universal interface lets you manage access control across all Google Cloud resources consistently. So you learn it once, then apply everywhere.
  • 45
    IBM Sterling Connect:Direct
    IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises. The solution ensures more reliable movement of files, from batch integration and movement of large images or catalogs to synchronization with remote locations. Sterling Connect:Direct also supports hybrid cloud deployment through certified containers which ensures easy and consistent deployment life-cycle management. IBM Certified Containers for Sterling Connect:Direct are enterprise-grade, security-rich product editions with integrated common software services for consistent deployment life-cycle management including easy install and configure options, management of upgrades and roll-back, scalability, and security. Supports a wide range of platforms including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX and Linux.
  • 46
    Risk Management Studio
    Risk Management Studio is the Integrated Risk Management Framework companies and institutions are choosing to clarify their vision for governance, risk and compliance. The IRMF software provides an extensive toolkit of solutions that guide you through the implementation of risk management policies, processes and procedures. Compliance is an organizations willingness to implement and follow requirements set by third parties, such as certifying agents, government bodies, and/or internal standards. RM Studio's Integrated Risk Management framework provides a holistic and systematic approach as a turnkey solution ready for your deployment now. The compliance to a standard, regulation, or law requires several key elements to come together in an organization. A Gap analysis is most commonly used and often required for proof of compliance.
  • 47
    Token Security

    Token Security

    Token Security

    Token Security accelerates secure enterprise adoption of Agentic AI by discovering, managing, and governing every AI agent and non-human identity across the organization. From continuous visibility to least-privilege enforcement and lifecycle management, Token Security provides complete control over AI and machine identities, eliminating blind spots, reducing risk, and ensuring compliance at scale.
  • 48
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 49
    Pirean Access: One

    Pirean Access: One

    Pirean Software

    We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user.
  • 50
    Email Hippo

    Email Hippo

    Email Hippo

    Email Hippo provides fast, accurate and secure email verification software, accessed via web app or API. The CORE product allows users to import lists of up to 500,000 emails and verify them directly within a self-service web app. MORE is an API product that can be used to check the validity of an email address in real time, looking at up to 74 data points for maximum accuracy. With ASSESS, users can check email addresses for common pre-fraud indicators. Email Hippo has provided email verification since 2000 and became ISO27001 certified in 2017.
    Starting Price: $10.00/one-time