86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
View Details
|
86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
View Details
|
88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
View Details
|
Sponsored
80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more Rippling IT
Visit Website
|
Description | Oracle Identity Management effectively manages user identities in organisations across all enterprise resources. It is a platform that provides scalable solutions for identity governance, access management and directory services. It aids in strengthening security, simplifying compliance and capturing business opportunities through multiple accesses including mobile and social. The latest addition to this software is the Oracle Identity Cloud Service, a highly innovative, fully integrated service that uses a multi-tenant cloud platform to deliver all the core identity and access management capabilities. Oracle Identity management is a highly reliable solution for authentication and authorization for operating systems, applications and database usage in huge business enterprises. With this platform, you can now provision, administer and manage passwords automatically, intertwined in a comprehensive workflow engine. This helps reduce IT administration costs and even improves security. This software also provides attestation support which means users can confirm access rights to people on a periodic basis. Read more | Cognito is an Identity and Access Management software that comes with an identity verification service and needs just a phone number to begin verifying your customers, which in turn assists you in streamlining your flow and cutting down troublesome inputs. It helps minimize manual review to the maximum while increasing match rate through highest quality regulated data on the market. It slowly gathers all required data from customers to verify them with the least information provided, without compromising on security and adhering to the strictest standards and best policies prevalent in the industry. It even automates compliance processes with the assistance of modern systems, helps verify age of customers if you happen to sell age-restricted goods and services and even enables real-time sanction screening while dealing with potential customers. It makes sharing links and creating new verification links possible, without writing codes, through its powerful and intuitive dashboard. Last, but not the least, the data that Cognito software provides is primary and hundred percent up-to-date. Read more | Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation. Read more | Rippling IT streamlines security enhancement by eliminating tedious tasks through a unified system for managing identity, access, devices, and inventory—all supported by direct access to comprehensive user data. Achieve full visibility and control over the security posture throughout the user and device lifecycle, ensuring that no detail is missed. With just a few clicks, automate error-prone and manual processes like device configuration, security control implementation, and access provisioning. Rather than juggling multiple systems, simplify the IT operations and reduce costs with a single, all-encompassing solution for IT management. Read more |
Pricing Options |
|
|
|
|
SW Score & Breakdown |
86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
SaaSworthy Awards |
Not Available
|
Not Available
|
# 4 Fastest Growing |
Not Available
|
Organization Types Supported |
|
|
|
|
Platforms Supported |
|
|
|
|
Modes of Support |
|
|
|
|
API Support |
|
|
|
|
User Rating |
|
|
|
Not Available
|
Rating Distribution |
|
|
|
Not Available
|
User Sentiments |
Robust Security Features, Comprehensive Identity Management Capabilities, Extensive Integration Options, Effective User Provisioning and Access Control Complex System Architecture, Challenging User Interface, Limited Reporting Functionality, Steep Learning Curve |
Not Available
|
Not Available
|
Not Available
|
Review Summary |
Overall, reviewers find the software easy to use and comprehensive, with solid features for managing user identities and access control. They appreciate its scalability, compliance with industry standards, and strong integration capabilities. However, some users mention occasional performance issues, complexity in configuration, and limited customization options as areas for improvement. These reviews suggest that the software is generally well-received, but there is room for improvement in terms of performance and flexibility. |
Not Available
|
Not Available
|
Not Available
|
Read All User Reviews | Read All User Reviews | Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Oracle Identity Management Custom |
Flow $2.49 $2.49 per user / month Identity $0.99 $0.99 per user / month Screening $0.10 $0.10 per user / month |
Keycloak Free |
Rippling IT Custom |
View Detailed Pricing
|
View Detailed Pricing
|
View Detailed Pricing
|
View Detailed Pricing
|
Oracle SSO
3.8 Based on 16 Ratings |
Ubisecure CIAM
4 Based on 1 Ratings |
|
||
Screenshots | Not Available | Not Available |
+ 5 More
|
+ 2 More
|
Videos | Not Available | Not Available |
Company Details | Located in: Redwood Shores, California | Located in: Palo Alto, California Founded in: 2013 | Located in: Raleigh, North Carolina | Located in: San Francisco, California |
Contact Details |
+1 800-633-0738 https://www.oracle.com/middleware/technologies/identity-management/ |
Not available https://cognitohq.com/products/identity-verification-service/ |
Not available |
Not available |
Social Media Handles |
Not available |
|
|
Not available |
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.