Browse Software
List Your Product
Loading...
AIM logo

AIM

  Add to Compare

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Okta logo
Visit Website

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SailPoint IdentityIQ logo
Visit Website

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
Visit Website

Overview

Description Okta is an identity and access management software that provides great user experience and easy administration by connecting suppliers, partners and customers of an enterprise securely within a single loop. It is an identity provider having deep integrations to hundreds of apps, which can be accessed through multiple devices very safely and securely. Octa helps companies to modernize IT by enabling them to move faster automatically and even eliminate friction, build customer experiences by delighting them with personalised and inherently secure applications and even prevent data breaches by establishing people as the new security perimeter. In simple words, Okta sets an identity standard which is independent and neutral. It is a platform which securely connects the right people to the right technologies at the right time. It provides instant access to all apps with a single sign on, provides an added level of authentication which prevents identity attacks, encourages lifecycle management, centrally manages a universal directory in your organisation and even controls and manages API access securely. Read more IdentityIQ lets you control every file and application across their hybrid IT environment by employees, partners, contractors, and even bots. It enables users to connect to 99% of applications and data, then uses a wizard setup and preconfigured workflows to onboard them in hours. The platform offers value-added features like Access Insights, Access Modeling, and Recommendations, providing greater intelligence and efficiency by keeping access policies up-to-date. These features let users know if access is safe or risky. Businesses can integrate governance controls with their mission-critical apps, such as AWS, SAP, and Salesforce, thus enabling their users to only access the information they require. SailPoint Predictive Identity provides AI-driven recommendations that help users determine when it’s safe to grant user access. Companies can also protect and govern access across millions of identities, billions of access points, and tens of thousands of applications and data sources. SailPoint IdentityIQ can also identify those users with risky access and track historical user access patterns. Read more CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets. Read more
Pricing Options
  • Free Trial Available
  • Starts at $2.00. Offers Custom plan.
  • Free Trial Not Available
  • Offers Custom plan.
  • Free Trial Not Available
SW Score & Breakdown

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    94%
  • Momentum
    78%
  • Popularity
    97%

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    90%
  • Reviews
    73%
  • Momentum
    63%
  • Popularity
    64%

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    80%
  • Reviews
    72%
  • Momentum
    68%
  • Popularity
    70%
SaaSworthy Awards # 1 Most Worthy # 1 Highly Rated
Not Available
Not Available

Features

Total Features
11 Features
8 Features
5 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 8 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 5 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 2 More - Show Less
  • Technical Details

    Organization Types Supported
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • Installed - Windows
    • Installed - Mac
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    API Support
    • Available
    • Available
    • Available

    Reviews & Ratings

    User Rating
    4.5/5 1,545 user ratings
    4.6/5 17 user ratings
    4.7/5 19 user ratings
    Rating Distribution
    • Excellent

      58.3%
    • Very Good

      32.5%
    • Average

      6.6%
    • Poor

      1.4%
    • Terrible

      1.2%
    • Excellent

      58.8%
    • Very Good

      41.2%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    • Excellent

      73.7%
    • Very Good

      26.3%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    User Sentiments

      Single Sign-On (SSO), Extensive Integrations, Enhanced Security, User-Friendly Interface

      Frequent Authentication Requirements, Mobile App Issues, Occasional Syncing Problems, Limited Customization Options

      Not Available
      Not Available
    Review Summary

    Based on reviews, Okta is generally praised for its user-friendly interface, ease of implementation, and robust security features. Many users have found it effective in streamlining user access management and improving overall security posture. However, some reviewers have mentioned occasional glitches and complexities in configuration, particularly for larger organizations. Additionally, a few users have expressed concerns about the pricing structure and the need for additional customization options. Overall, Okta seems to be a reliable and comprehensive identity management solution, but it may require careful evaluation and customization to fit specific organizational needs.

    Not Available
    Not Available
      Read All User Reviews Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Starts at $2.00. Offers Custom plan.
    • Free Trial Not Available
    • Offers Custom plan.
    • Free Trial Not Available
    Pricing Plans
    Monthly Plans Annual Plans

    Single Sign-On $2.00 $2.00 per user / month

    Adaptive Single Sign-On $5.00 $5.00 per user / month

    Multi-factor Authentication $3.00 $3.00 per user / month

    Adaptive Multi-factor Authentication $6.00 $6.00 per user / month

    Universal Directory $2.00 $2.00 per user / month

    Lifecycle Management $4.00 $4.00 per user / month

    API Access Management $2.00 $2.00 per user / month

    Advanced Server Access $15.00 $15.00 per month

    Access Gateway $3.00 $3.00 per user / month

    Light (Workflows) $4.00 $4.00 per user / month

    Medium (Workflows) $5.00 $5.00 per user / month

    Unlimited (Workflows) $6.00 $6.00 per user / month

    Light (Identity Governance) $9.00 $9.00 per user / month

    Medium (Identity Governance) $10.00 $10.00 per user / month

    Unlimited (Identity Governance) $11.00 $11.00 per user / month

    Enterprise Custom

    Essentials (B2C Plans) $23.00 $23.00 per month

    Professional (B2C Plans) $240.00 $240.00 per month

    Essential (B2B Plans) $130.00 $130.00 per month

    Professional (B2B Plans) $800.00 $800.00 per month

    SailPoint IdentityIQ Custom

     
    View Detailed Pricing
    View Detailed Pricing
    Not Available

    Screenshots & Videos

    Screenshots App List Not Available Not Available
    Videos Video Thumbnail
    + 2 More
    Video Thumbnail
    + 2 More
    Not Available

    Vendor information

    Company Details Located in: San Francisco, California Founded in: 2009 Located in: Austin, Texas Located in: Newton, Massachusetts
    Contact Details

    +1-800-219-0964

    https://www.okta.com

    +1 888-745-7607

    https://www.sailpoint.com/solutions/identityiq/

    1-888-808-9005

    https://www.conjur.org/

    Social Media Handles

    Not available

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed