Browse Software
List Your Product
Loading...
Okta logo

Okta

  Add to Compare

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

AWS IAM logo
View Details

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

IBM Security Verify Access logo
View Details

Overview

Description AWS IAM is an intuitive Identity and Access Management solution, allowing organizations monitor access to AWS based resources and APIs in a secure way. Enterprises can monitor users and groups or schedule specific access rights to various AWS resources using the IAM module within the software. Business houses get to define specific conditional terms like, time of the day and monitor employee’s access factors, such as whether they use SSL, their original IP address, or whether they have active authentication with an MFA device. AWS IAM can be utilized by organisations to identify and finetune their policies besides modifying controlled access to variable services. Enterprises can augment user credentials to protect their AWS environments, based on the AWS MFA security feature within the particular. The system prompts employees to demonstrate their physical possession of MFA-token hardwire or provide a valid code through an MFA-supported mobile device. AWS IAM is compatible with identity management solutions that support SAML2.0 besides the federation samples offered by AWS Console SSO. Read more IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, helps user simplify users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. Verify Access helps user strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with Verify Access. Read more
Pricing Options
  • Free Trial Available
  • AWS IAM Offers Custom plan.
  • Free Trial Not Available
  • IBM Security Verify Access Offers Custom plan.
SW Score & Breakdown

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    76%
  • Momentum
    60%
  • Popularity
    74%

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    77%
  • Momentum
    60%
  • Popularity
    62%
SaaSworthy Awards # 5 Fastest Growing
Not Available

Features

Total Features
9 Features
10 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 7 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • SaaS/Web/Cloud
    Modes of Support
    • Online
    • Online
    API Support
    • Available
    • NA

    Reviews & Ratings

    User Rating
    4.6/5 133 user ratings
    3.3/5 32 user ratings
    Rating Distribution
    • Excellent

      69.9%
    • Very Good

      26.3%
    • Average

      0%
    • Poor

      3%
    • Terrible

      0.8%
    • Excellent

      0%
    • Very Good

      50%
    • Average

      34.4%
    • Poor

      12.5%
    • Terrible

      3.1%
    User Sentiments

      Granular Access Control, Extensive Integrations, Role-Based Access Control, Centralized User Management

      Complex Policy Management, Steep Learning Curve, Confusing User Interface, Limited Cross-Platform Compatibility

      Not Available
    Review Summary

    Users find AWS Identity and Access Management (IAM) easy to use and appreciate its fine-grained control over permissions and access. It is praised for its strong security features, including multi-factor authentication and role-based access control. Additionally, IAM's integration with other AWS services is a major advantage. However, some users have reported issues with the complexity of the platform and occasional difficulties in setting up and managing policies. Overall, AWS IAM is a powerful and secure tool for managing access and permissions, favored for its ease of use and integration with other AWS services.

    Not Available
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • AWS IAM Offers Custom plan.
    • Free Trial Not Available
    • IBM Security Verify Access Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    AWS IAM Custom

    IBM Security Verify Access Custom

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots prod Stage Editor
    + 1 More
    Not Available
    Videos Video Thumbnail Video Thumbnail
    + 1 More

    Vendor information

    Company Details Located in: Seattle, Washington Located in: New York, New York
    Contact Details

    Not available

    https://aws.amazon.com/iam/

    +1 914-499-1900

    https://www.ibm.com/products/verify-access

    Social Media Handles

    Not available

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed