Alternatives to bi-Cube Identity Access Management

Compare bi-Cube Identity Access Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to bi-Cube Identity Access Management in 2026. Compare features, ratings, user reviews, pricing, and more from bi-Cube Identity Access Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    Frontegg

    Frontegg

    Frontegg

    Frontegg is a Customer Identity and Access Management (CIAM) platform that simplifies authentication, authorization, and user management for SaaS companies. It enables developers to implement advanced identity features quickly, then shift ongoing administration to other teams. With Frontegg, Product, Infosec, and Customer Success teams can take control of key identity tasks like managing user roles, enforcing security policies, and handling customer requests, all without engineering support. Developers reduce toil and regain focus on core product work, while stakeholders move faster without bottlenecks. Frontegg supports modern identity features including SSO, MFA, role-based access control, entitlements, multi-tenancy, and audit logs. Its low-code platform integrates in days and provides a user-friendly admin portal that bridges technical and non-technical teams. Frontegg increases operational efficiency, improves security posture, and enhances the customer experience.
    Leader badge
    Compare vs. bi-Cube Identity Access Management View Software
    Visit Website
  • 2
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. bi-Cube Identity Access Management View Software
    Visit Website
  • 3
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 4
    Foxpass

    Foxpass

    Foxpass

    Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.
  • 5
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 6
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 7
    Microsoft Identity Manager
    Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors.
  • 8
    OpenIAM

    OpenIAM

    OpenIAM

    Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user.
  • 9
    SIVIS Identity Manager
    A high number of identities and authorizations means a high amount of effort – especially if they have to be administered manually by the employees. Using the right IAM tool (Identity and Access Management Tool) supports you with the administration and relieves your employees. The SIVIS Identity Manager automates and simplifies the recording, control and administration of users and the associated access rights and approval processes. A clean definition of workflows allows processes to be implemented and easily mapped in very complex system landscapes. With the SIVIS Identity Manager you can easily perform mass changes. Quickly and easily add or remove new attributes such as roles in the destination system for any number of users. Administration with a thorough authorization concept, visibility and responsibilities within the SIVIS Identity Manager. You can also define an individual confirmation strategy and implement a two-man rule.
  • 10
    NdSecure

    NdSecure

    Ndende Technologies

    NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
  • 11
    iGRIFFIN

    iGRIFFIN

    Secuve

    iGRIFFIN is the solution for consolidated account and privilege management, also know as 'Identity and Access Management'. It provides consolidated account management, control over exploitable commands, access control, and user event audit, based on multi-factor authentication to check actual users by employing multi-factor authentication methods. Also it enables effective internal control over in-house systems to be made in effect by harnessing automated processes for application and approval in case of user access. Command control over a kind of exploitable commands, which should be prohibited to be used. The control is to be enforced in such a way that only authorized users through application/approval processes can be permitted to use exploitable commands. The control is to be enforced in such a way that only authorized users through application/approval processes should be permitted to access important data.
  • 12
    Strata Maverics Platform
    Identity integrations across all your clouds on one powerful platform. Strata’s Maverics Identity Orchestration Platform is the first distributed, multi-cloud identity solution. Maverics is an abstraction layer that integrates heterogeneous identity management systems to make many policies, APIs, and sessions work as one. Enterprise identity management is hard. Making identity work for multi-cloud doesn’t have to be. Enterprises are rapidly moving to distributed architectures. Whether a hybrid of on-premises and cloud, or several clouds, running distributed systems creates identity silos. Applications live on different clouds, like Microsoft Azure, AWS, and Google Cloud, and each cloud comes with its own identity system. Add the challenge of on-premises legacy apps, and you’ve got a distributed identity management problem. Maverics is a new approach to identity management for multi-cloud environments.
  • 13
    Authress

    Authress

    Rhosys

    Authress, Complete Auth API for B2B. Authentication & Authorization gets complicated quickly, even if it appears easy, there is a lot of hidden complexity in authorization, you don’t want to do it on your own. It takes time to get authorization right In simple cases, it takes an average software team 840 hours to implement authorization logic. As you add features to your application, this number grows rapidly. Without expertise, you leave your door wide open to malicious attacks. You risk compromising your user data, non-compliance with local regulations, and massive business losses. * Secure authorization API--Instead of building your own authorization logic, call our API * Granular permissions--Define multiple levels of access and group them by user roles. As granular as you want * Identity Provider integrations--Plug in any of your preferred ID providers with a simple API call. * SSO and full user management
  • 14
    Approw

    Approw

    Approw

    Approw is an easy-to-implement, adaptable authentication and authorization platform, built for the cloud, but compatible with many on-premises applications. Approw focus on identity and build a social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business, but also redefines the user experience. Multi-factor Authentication (MFA) is a simple and effective security approach that goes beyond usernames and passwords to Add a layer of security. For example, U-Shield for banks and off-site login require SMS verification. Empower Approw applications to quickly enable multi-factor authentication (MFA), and immediately improve application authentication and access security levels. Compared with traditional multi-factor authentication, "adaptive" multi-factor authentication can choose to apply different MFA methods according to the current security situation.
  • 15
    Hire2Retire
    RoboMQ’s Hire2Retire is a comprehensive workforce lifecycle management solution that manages the entire JML lifecycle events, such as hiring, department transfers, terminations, and long-term leaves. It is an Identity and Access Management platform that synchronizes HR with IT infrastructure, including Active Directory (AD), Okta, and Google Workspace. Hire2Retire enables organisations to effectively manage employee access and privileges throughout their work cycle. 
 Hire2Retire integrates with 27 HR and ATS systems, identity providers (IdP) like Active Directory, Entra ID, Okta, and Google Workspace, along with 10+ leading Service Management platforms like ServiceNow, Salesforce, SolarWinds, and FreshService.
  • 16
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 17
    IAMCompare

    IAMCompare

    IAMCompare

    IAMCompare is the only solution focused on auditing the integrity of your Provisioning & De-provisioning process. We perpetually identify user access exceptions and track to resolution, reducing both time and cost from your process. IAMCompare is a focused solution that brings companies direct visibility into their account. Our solution provides results at a transparent price point. Next, our clients identify assets (applications, databases, devices, other) that require monitoring and supply relevant account data. IAMCompare unites census and account information and identifies actionable anomalies. View account access for employees as well as authorized contractors, vendors & customers. Leverage IAMCompare to streamline system user access reviews and standardize vendor, customer and other 3rd party user certifications.
  • 18
    Huawei IAM

    Huawei IAM

    Huawei Cloud

    Create IAM users and groups and grant them permissions by using policies and roles, allowing or denying access to specific services and resources. Delegate a trusted HUAWEI CLOUD account or a cloud service to access your HUAWEI CLOUD resources based on assigned permissions. Establish a trust relationship between your existing identity system and HUAWEI CLOUD by creating a SAML-based or OpenID Connect–based identity provider or a custom identity broker. In this way, users in your enterprise can log in to HUAWEI CLOUD through single sign-on (SSO). You can require IAM users to complete identity authentication each time they log in or perform a critical operation. IAM allows you to create IAM users and authorize them to securely access your resources using their own username and password. IAM allows you to authorize another HUAWEI CLOUD account or a cloud service to access your resources based on assigned permissions.
  • 19
    Alibaba Cloud IDaaS

    Alibaba Cloud IDaaS

    Alibaba Cloud

    Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud.
  • 20
    FortiAuthenticator
    FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations.
  • 21
    SlashID

    SlashID

    SlashID

    Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.
  • 22
    TrustBuilder

    TrustBuilder

    TrustBuilder

    TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Through our Access Management Platform, TrustBuilder.io, our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. > TrustBuilder's SaaS MFA provides airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 23
    Quicklaunch

    Quicklaunch

    Quicklaunch

    QuickLaunch is the #1 leader in Identity and Access Management (IAM) for Higher Education. More than 500 organizations trust QuickLaunch’s platform to manage over 2,000,000 identities and integrate over 3,000 applications worldwide. CIOs, CTOs, and CISOs use QuickLaunch IAM technologies to engage with students, faculty, and staff and protect them throughout their journey. QuickLaunch’s technology is vital in protecting the user experience, driving both operational efficiencies and higher productivity for colleges, universities, and institutions. Improves cyber security posture by protecting user accounts from being hacked and thwarting ransomware and phishing cyber attacks. Automatically provisions students from the Student Information System and employees from the Human Resources system so they can quickly get access to the apps they need when they matriculate and join.
  • 24
    Jellyfish

    Jellyfish

    Cogito Group

    Jellyfish has been developed as a modular solution. We have significantly improved the way identity, credentials, access and other security products are managed by developing a series of connectors (Cognectors). These connectors enable the creation of automatic workflows, pass data through disparate systems and use triggers on one platform (example PACS) to affect another (example LACS). The Cognectors feed data from disparate systems into the Service Bus. This enables a number of benefits including enhanced monitoring and reporting of activity. Access to systems and building areas can seamlessly be added and removed as people join, move within, or leave an organisation through existing HR functions. Jellyfish uses modern authentication protocols and adaptive support to provide integration with logical and physical access control systems. Jellyfish focuses on future-proofing security, using emerging standards and multi-factor authentication.
  • 25
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 26
    HORACIUS IAM
    The agility of business processes directly depends on the management of access rights to systems, and choosing a platform for IAM Identity Management that guarantees the security of all access, applications and data is one of the most important strategic decisions that will reduce costs and risks, increasing the productivity of the entire company. After all, how do you ensure that all users in your organization have only the appropriate levels of access, applications, data and transactions? In addition, the IAM Identity Management platform can be integrated with the main Human Resources systems, synchronizing information and performing tasks vital to the smooth running of the business. The entire history of people's rights to the systems is managed, from the first access, at the time of admission, until the revocation of rights at the end of the link.
  • 27
    Simeio

    Simeio

    Simeio

    Simeio provides the most complete Identity and Access Management (IAM) solution that engages securely with anyone, anywhere, anytime, with an unparalleled “service first” philosophy. Whether you’re managing the identities of customers, partners or employees, we’ve got you protected. From retail to banking, hospitality, healthcare, government, universities and more, our job is to make your access simple, reliable and secure wherever you are…while keeping out those who don’t belong. And by protecting identities, we can protect something else just as important: your brand reputation. We partner with, leverage and interoperate with solutions from the industry’s most trusted companies to create a platform of outstanding reliability and security. Yes, what we do is complex and specialized. But you can leave all the complexity to us. What we deliver simplifies how your company manages identities.
  • 28
    MonoSign

    MonoSign

    MonoFor

    MonoSign is a comprehensive Identity & Access Management solution for enterprise level companies. Get Universal Directory, Single Sign-On, Adaptive MFA, Lifecycle Management and many more. MonoFor is standing today with MonoSign — one of the most powerful and quick-to-deploy Identity & Access Management software for enterprise level companies.
  • 29
    WALLIX Trustelem

    WALLIX Trustelem

    WALLIX Group

    WALLIX Trustelem is designed to make administration simple and intuitive. The web-based administration console enables IT staff to easily set up directory synchronization, manage life cycles of external user accounts and applications, create and adapt access rules, monitor activity, and audit access security. Keep control over your identities and data! The WALLIX Trustelem platform is hosted and operated by a trusted European cloud provider. Your data sovereignty and security are essential to ensure quality of service and to protect your company’s assets. Trustelem is designed for simplicity of user experience and administration, in both build and run phases. Security is at the heart of Trustelem's infrastructure, software and operations.
  • 30
    Passly

    Passly

    IDAgent

    Growing numbers of remote workers, increased dependency on cloud applications, and explosive increases in cyber theft should require every organization of every size to consider Secure Identity & Access Management. With Passly™ from ID Agent (a Kaseya company), IT teams can easily, simply, and affordably enable the right people to have the right access to the right resources – all from the right devices and locations. Secure Password Management, Single Sign-On, Multi-Factor Authentication and more. In a time when the threat of cyberattack has never been greater, and with nearly 80% percent of all data breaches due to lost, weak or stolen passwords, it’s critical to select the right secure identity & access management platform. Passly provides the most comprehensive and cost-effective solution to enable security, compliance, and efficiency. Shared Password Vaults allow techs to manage and store passwords for business, personal or shared accounts. Centralized and easy to use.
  • 31
    Google Cloud Identity and Access Management (IAM)
    Fine-grained access control and visibility for centrally managing cloud resources. Identity and Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage Google Cloud resources centrally. For enterprises with complex organizational structures, hundreds of workgroups, and many projects, IAM provides a unified view into security policy across your entire organization, with built-in auditing to ease compliance processes. We recognize that an organization’s internal structure and policies can get complex fast. Projects, workgroups, and managing who has authorization to do what all change dynamically. IAM is designed with simplicity in mind: a clean, universal interface lets you manage access control across all Google Cloud resources consistently. So you learn it once, then apply everywhere.
  • 32
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 33
    Twine

    Twine

    Twine Security

    Twine builds AI digital cybersecurity employees who execute tasks from A to Z to help cyber teams close the talent gap. Our first digital employee, Alex, learns, understands and takes away the burden of Identity and Access Management (IAM) tasks - proactively completing your organization’s cyber objectives.
  • 34
    Google Cloud Identity
    A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
    Starting Price: $6 per user per month
  • 35
    Pirean Access: One

    Pirean Access: One

    Pirean Software

    We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user.
  • 36
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 37
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 38
    IAM Cloud

    IAM Cloud

    IAM Cloud

    IAM Cloud’s world-leading drive management tool for cloud storage. It provides secure direct access (no sync) to OneDrive for Business, MS Teams and SharePoint Online. Great for desktop and VDI environments alike. Our simple & secure sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, and basic identity sync & provisioning from Active Directory. Everything you need from an SSO solution without the premium price. IAM Cloud is an identity company at heart. With IDx you can connect & sync identities across all kinds of systems, allowing the full automation of the Joiner, Mover and Leaver process. IDx integrates with on-prem, cloud and custom-built HR, ERP, CRM, MIS & Directory systems. Cloud-based data migrator. Supports to-the-cloud and from-cloud-to-cloud migrations for Office 365. Merge multiple Office 365 tenancies into one tenant. Split tenancies.
  • 39
    OpenText IAM
    Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. With OpenText IAM in place, information access becomes manageable, governable and visible. Identity and access management creates and manages user accounts, roles and access rights for individual users, systems and devices. The best IAM solutions manage both employee identities within an organization and across an extended business ecosystem of customers and partners. IAM is also essential to manage the identities of IoT devices.
  • 40
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 41
    Netwrix Privilege Secure for Discovery
    Only Netwrix Privilege Secure for Discovery removes your biggest undiscovered security risk by providing Just-Enough access, Just-in-Time, eliminating standing privilege with continuous scanning and agentless, faultless simplicity, unlike legacy privileged access management (PAM) solutions that leave unprotected attack surfaces and are difficult to deploy. Netwrix Privilege Secure for Discovery ensures privileged access is precisely allocated and continuously inventoried by granting privileged access on a Just-in-Time, Just-Enough basis using two-factor authentication. Netwrix Privilege Secure for Discovery was purpose-built to address this problem, using an identity-enabled response, and be a force multiplier to security programs worldwide. The founding team especially had in mind those looking to secure and enable access to global, distributed and always scaling infrastructure. Netwrix Privilege Secure for Discovery was purpose-built to address this problem and be a force multiplier.
  • 42
    Anomalix

    Anomalix

    Anomalix

    Engage with employees from Day 1 and remove barriers to collaboration. Real-time and historical data for access management will reduce compliance costs and empower employees. Passwordless enterprise identity and access management. A secure solution to handle the employee lifecycle events (Joiner, Mover and Leaver) to safeguard sensitive data while affording the least privilege access required for job performance. Identify anomalous and suspicious User and Entity behavior. Create efficient and accurate job roles that provide the right level of access and information. Implement an identity management solution for non-employee individuals and corporate assets. Enable cross-organizational collaboration to increase data quality and reduce problems. Create an authoritative source for all non-employee Identities. Perform the necessary identity related due diligence. Manage all identity lifecycle events for humans and assets (Engage, Change, Disengage, Reengage).
  • 43
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 44
    DoubleClue

    DoubleClue

    DoubleClue

    DoubleClue is an Identity and Access Management platform from HWS Group in Bavaria to manage identities, rights and access. It secures company networks with modern multi factor authentication from cyberattacks targeted on digital identities / the "human factor". Plus, the platform offers an integrated password management and secure cloud storage for confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 45
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 46
    CzechIDM

    CzechIDM

    BCV solutions

    IT department is typically snowed under with routine requests having to do with account management: manual account creation, password resetting, auditing work, long-inactive accounts. Often, there is no accounting for who has got access and where. We help our customers to automate their routine processes, centralize information systems, delegate account management to business owners, and keep transparent evidence of granted permissions. Identity Management (IdM) is all about centralizing identity and access management within IT systems. It enables the right persons to gain access to the right kind of data sources, at the right time, for the right reasons, and most importantly, with reliable evidencing records on hand. We help companies to improve Identity and Access Management. Our aim is to make companies safer and more efficient by simplifying user management across companies’ systems.
  • 47
    ARCON | IDAM
    ARCON | IDAM is a solution that ensures the details of an employee’s overall employment tenure are maintained and managed from a single console. This allows administrators to perform access certification and review activity in a much faster and more efficient manner. At the same time, the end users do not have to wait too long to gain legitimate access to business applications, legacy applications, or IT Infrastructure devices. Enhance your digital experience at the workplace by maintaining a digital identity of each individual from the day an employee starts working for you until after they leave the organization, leading to faster development and release cycles. No more waiting for support to reply before you start your work again. Administration activities of adding, deleting, updating user credentials are now easier than ever, reducing help desk support calls such as password change, access requests, and access removal, resulting in reduced total cost of ownership.
  • 48
    Soffid IAM
    Soffid provides full Single Sign On experience and full identity and access management features by policy-based centralized orchestration of user identities. Everything delivered by a full open source solution. Improve user productivity with Soffid IAM. Soffid provides a single configuration tool for the administrator and provides an easy to use self service portal for the end users. One single tool for everyone to enhance user productivity! Increase IT internal and external security. Soffid uses state of the art security standards. Identity and Access Management provides a new vision on security, no longer based in the old school firewall vision, but centered in who, when and how is the user accessing specific resources to improve external and internal security. Increase IT flexibility. Soffid enables the option of managing all the IT assets not based on their location but based on who is accessing them.
  • 49
    CoffeeBean Identity and Access Management
    CoffeeBean Identity and Access Management is a comprehensive solution in the areas of IAM (Identity and Access Management) and CIAM (Customer Identity and Access Management). The different modules of this platform include Single Sign-On (SSO), Multi-Factor Authentication (MFA or 2FA), Adaptive Authentication, Directory Services, Lifecycle Management. Ask, capture and safely store information about the user’s consent during their registration process. Manage terms of the service lifecycle, prompting the user to accept new terms when necessary. Track all changes for consents, permissions and terms of service. This feature helps your business comply with regulations such as GDPR. Set up forms to gradually capture data from users in different moments of their journey (on first contact, after the nth login, coupon redeeming). With this technique, you avoid overwhelming customers with long forms during their registration process but still get the chance to progressively build their profile.
  • 50
    AU10TIX

    AU10TIX

    AU10TIX

    AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.