Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (5)
Starting Price
  • (15)
  • (1)
  • (3)
  • (1)
  • (10)
Features
  • (76)
  • (74)
  • (73)
  • (73)
  • (70)
  • (63)
  • (59)
  • (57)
  • (52)
  • (42)
  • (32)
SW Score
  • (2)
  • (2)
  • (19)
  • (29)
  • (20)
Deployment
  • (13)
  • (6)
  • (88)
  • (22)
  • (19)
Customer Types
  • (8)
  • (6)
  • (86)
  • (87)
  • (82)
Pricing Model
  • (35)
  • (27)
  • (2)
  • (6)
  • (41)
  • (70)
Integrated With
  • (10)
  • (6)
  • (6)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 20 of 88 Products

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Okta logo
Seamless, secure, user-friendly, all that you can ask for 4.5 Based on 1550 Ratings
Visit Website + Add to Compare

What is Okta and how does it work?

Okta is an identity and access management software that provides great user experience and easy administration by connecting suppliers, partners and customers of an enterprise securely within a single loop. It is an identity provider having deep integrations to hundreds of apps, which can be accessed through multiple devices very safely and securely. Octa helps companies to modernize IT by enabling them to move faster automatically and even eliminate friction, build customer experiences by delighting them with personalised and inherently secure applications and even prevent data breaches by establishing people as the new security perimeter. In simple words, Okta sets an identity standard which is independent and neutral. It is a platform which securely connects the right people to the right technologies at the right time. It provides instant access to all apps with a single sign on, provides an added level of authentication which prevents identity attacks, encourages lifecycle management, centrally manages a universal directory in your organisation and even controls and manages API access securely.

Read more

Okta Pricing

  • Free Trial Available
  • Starts at $2.0.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    93%
  • Momentum
    77%
  • Popularity
    97%

User Sentiment

  • Single Sign-On (SSO), Extensive Integrations
  • Frequent Authentication Requirements, Mobile App Issues

location iconSan Francisco, California

location iconLive Since 2009

Visit Website

97% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

JumpCloud logo
Integrated cloud directory platform for businesses 4.7 Based on 2322 Ratings
Visit Website + Add to Compare

What is JumpCloud and how does it work?

JumpCloud is an intact cloud directory platform for organisations, enabling admins to control IT environments in the cloud, on-prem, remote and more. They can use a simple web interface to provision, manage and grant access to a wide variety of resources that are needed by employees on a day to day basis. Managers can import users from pre-existing platforms or create new users within JumpCloud, allowing them access to systems, applications, networks and other essential resources as well. Employers can use external apps like Zoom, Office365, GitHub, G Suite and Slack to get the work done. An App Identity Management feature within the particular lets enterprises generate and monitor accounts for their employees, specifying permissions and roles within those apps. From the employee front, JumpCloud lets business houses allow individual employees to make choices regarding their collaboration tools, helping them get the job done. The solution can serve as an authoritative directory for individual organisations.

Read more

JumpCloud Pricing

  • Free Trial Available
  • Starts at $9.0.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    91%
  • Momentum
    74%
  • Popularity
    89%

User Sentiment

  • Ease of Use, Centralized Management
  • Occasional Service Interruptions, MDM Functionality Limitations

location iconLouisville, Colorado

location iconLive Since 2012

Visit Website

93% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

OneLogin logo
Manage identity and access within a unified location 4.4 Based on 668 Ratings
Visit Website + Add to Compare

What is OneLogin and how does it work?

OneLogin is a compact value identity and access management software trusted by 2000+ customers all over the globe. Users can depend on the particular to avail facilities like resource optimization, top-graded operational efficiency, feature-rich product functionality along with value leading identity. Further, admins can leverage the software to protect their company by centralizing and securing devices, applications and end-users all within a unified portal. On cloud infrastructure and Sandboxes featured by OneLogin, helps users run detailed tests through codes before deploying them, for accurate change management. Moreover, features like smart factor authentication, single sign-on, advanced directory and identity lifecycle management help managers safeguard the identity of their workforce from unnecessary threats. Developers can utilize OneLogin, to generate top graded identity management applications for their business. They can make use of coding languages like Python, PHP, Ruby and Java. Organizations that want to offer secure customer experiences can trust on OneLoging with their business processing.

Read more

OneLogin Pricing

  • Free Trial Available
  • Starts at $2.00. Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    94%
  • Reviews
    97%
  • Momentum
    66%
  • Popularity
    84%

User Sentiment

  • Single Sign-On Capabilities, Extensive Application Integrations
  • Occasional System Outages, Confusing User Provisioning

location iconSan Francisco, California

location iconLive Since 2009

Visit Website

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Shufti Pro logo
Verifying Identities Instantly for Business 4.7 Based on 281 Ratings
Visit Website + Add to Compare

What is Shufti Pro and how does it work?

Shufti Pro is an extensive enterprise solution which offers more than just Identity Verification. It enables users to quickly and efficiently verify their identity, with rapid response times of 40 seconds or less. This verification journey is captured in a video clip, which is then provided to the Client to review. This video clip displays each step the user took during the verification process, including the ID documents and webcam interaction. In addition, Shufti Pro also provides a downloadable report containing complete verification data, such as KYC logs, user information, time stamps and comments. This report can be used to submit to banks, release payments or for creating a backlog. The comprehensive Shufti Pro solution is designed to make the verification process simple, secure and efficient.

Read more Read less

Shufti Pro Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    92%
  • Reviews
    86%
  • Momentum
    74%
  • Popularity
    84%

User Sentiment

  • Fast Verification Process, Easy to Use
  • Unclear Instructions, Issues with Document Acceptance

location iconHelsingborg, Sweden

Visit Website

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Ping Identity logo
Secure Access for the Digital Enterprise 4.5 Based on 222 Ratings
Visit Website + Add to Compare

What is Ping Identity and how does it work?

Ping Identity frees the digital enterprise by providing secure access that enables the right people to access the right things, seamlessly and securely. Facing the end-of-life stage of their aging legacy IAM solution, this manufacturer needed a modern IAM solution that could connect to multiple employee data stores and give both employees and partners federated SSO to a mix of internal and SaaS applications. They turned to the Ping Intelligent Identityâ„¢ Platform for standards-based, one-click access from any device.

Read more Read less

Ping Identity Pricing

  • Free Trial Available
  • Starts at $3.0.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    88%
  • Momentum
    62%
  • Popularity
    89%

User Sentiment

  • Secure Authentication, Seamless Single Sign-On
  • Complex Configuration, Mobile App Issues

location iconDenver, Colorado

Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Idaptive Next-Gen Access logo
Powerful enterprise-grade security solution 4.5 Based on 127 Ratings
Visit Website + Add to Compare

What is Idaptive Next-Gen Access and how does it work?

Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization.

Read more Read less

Idaptive Next-Gen Access Pricing

  • Free Trial Available

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    83%
  • Momentum
    64%
  • Popularity
    76%

User Sentiment

  • Secure Password Management, Single Sign-On (SSO)
  • Mobile App Issues, Limited Customization Options

location iconSanta Clara, California

location iconLive Since 2018

Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

RSA SecurID logo
Be secure and organised with this identity & access software 4.4 Based on 366 Ratings
Visit Website + Add to Compare

What is RSA SecurID and how does it work?

RSA SecurID is an identity and access management software that offers a seamless access experience to users by using two-factor authentication for protecting networks. Right from the ground to the cloud, this software uses identity insights, threat intelligence and business context for delivering a safe and secure access to all your users across all your applications and gadgets. It provides a one-powerful suite-of-solutions through a range of features which include multi-factor authentication, identity governance, risk based access management and user lifecycle management, all in one loop. In this era of growing cyber crimes, RSA SecurID provides an analytically-driven insight to prioritize identity risks and protects assets accordingly through successfully designed Identity and access management programs which monitor complete control over who gets access to what. Undoubtedly, it offers a complete solution for security and control to keep ahead of growing threats.

Read more Read less

RSA SecurID Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    98%
  • Reviews
    88%
  • Momentum
    64%
  • Popularity
    66%

User Sentiment

  • Ease of Use, Enhanced Security
  • Occasional Technical Issues, Token Synchronization Problems

location iconBedford, Massachusetts

Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Gluu logo
A Highly Secured Identity And Access Management Tool 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Gluu and how does it work?

Gluu provides Single Sign-on (SSO), Two-factor authentication (2FA), and access management service to different types of companies. The SSO feature offers secure sign-on across OpenID Connect, SAML, and CAS web & mobile applications. Users can choose from a variety of 2FA mechanisms and business logic to enforce strong security everywhere. Using access management, users will have the capability to manage who can access which resources across the digital kingdom. Gluu enables companies to bridge existing LDAP identity systems and Active Directory to give apps secure access to user data. The tool also helps in the fast deployment of code using Linux packages for Ubuntu, CentOS, RHEL, and Debian on any cloud platform. Using the in-built features, companies can also add, edit, and manage people, groups, and user attributes to ensure valid information is released to the right applications and services. It allows data movement between Gluu and existing identity management (IDM) tools by leveraging LDAP and SCIM APIs.

Read more Read less

Gluu Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    70%
  • Momentum
    69%
  • Popularity
    81%

User Sentiment

Not Enough Reviews!

Write a Review

location iconAustin, Texas

location iconLive Since 2009

Visit Website

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Microsoft Entra ID logo
Cloud identity and access management solution 4.7 Based on 664 Ratings
Visit Website + Add to Compare

What is Microsoft Entra ID and how does it work?

Microsoft Entra ID is a cloud identity and access management solution designed to help organizations keep their data safe and secure. By connecting employees, customers, and partners to their apps, device, and data, Microsoft Entra ID offers a comprehensive set of tools to make data access management efforts simpler and more efficient. With the ability to quickly and easily set up access control and authentication rules, Entra ID has the power to facilitate better organization-wide collaboration and ensure the security of proprietary information. Through the advanced identity solutions provided by Entra ID, businesses can easily integrate a flexible security solution without the worry of sacrificing convenience. Microsoft Entra ID is the perfect choice for professional organizations that want to strengthen their security measures and protect their data.

Read more Read less

Microsoft Entra ID Pricing

  • Free Trial Not Available
  • Starts at $6.0. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    98%
  • Reviews
    78%
  • Momentum
    66%
  • Popularity
    68%

User Sentiment

Not Enough Reviews!

Write a Review

location iconRedmond, Washington

Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Keycloak logo
An Open-source Identity And Access Management Tool For Modern Applications 4.5 Based on 44 Ratings
Visit Website + Add to Compare

What is Keycloak and how does it work?

Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation.

Read more Read less

Keycloak Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    73%
  • Momentum
    71%
  • Popularity
    73%

User Sentiment

Not Enough Reviews!

Write a Review

location iconRaleigh, North Carolina

Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Avatier Identity Anywhere logo
Get identity monitored in a safe and secure manner 4.8 Based on 70 Ratings
Visit Website + Add to Compare

What is Avatier Identity Anywhere and how does it work?

Avatier Identity Anywhere is a world-class identity management solution for enterprises, enabling them to mitigate individual risks with maximum convenience and control. The software features a native login mechanism, eliminating dual administration. A rollback feature within the particular ensures that users can always get back to previous versions of an individual document as per their business needs. Avatier Identity Anywhere ensures high-class security by saving business-relevant data in an encrypted format without co-mingling. Delegated System Administration feature within the particular, enables admins to control access rights, related to making changes within user identity mapping files. The software also sends on-time notifications when an unauthorized person makes changes within the identity database of an enterprise. Tamper detection technology assures accurate data monitoring and storage. Further, admins can also monitor important actions related to password resets and enrollment using the particular platform. They can exclude accounts, suppress confirmation based emails and deny access to passwords.

Read more Read less

Avatier Identity Anywhere Pricing

  • Free Trial Available

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    83%
  • Momentum
    61%
  • Popularity
    77%

User Sentiment

Not Enough Reviews!

Write a Review

location iconPleasanton, California

location iconLive Since 1995

Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

One Identity logo
Eliminate potential risks out of and access management and enterprise identity 3.7 Based on 10 Ratings
Visit Website + Add to Compare

What is One Identity and how does it work?

One Identity is an advanced identity and access management tool that helps businesses to establish an identity-centric security strategy with Privileged Access Management (PAM) solutions. The tool helps to mitigate risk, secure data, satisfy compliance and meet uptime requirements by offering customers access to data and applications they need. With the Identity Manager, users can not only unify information security policies but can even fulfil governance needs in present times and into the future. One Identity comes with certified SAP integration offering advanced capabilities to enhance existing SAP security models and even improves them. Businesses can make better decisions by combining security information and policies from multiple sources to reduce risks. Further, One Identity provides auditors with detailed, real-time governance reports that include information about the available resources in the users’ environment and who has access to them. The tool also helps to achieve unified governance for all employees, regardless of their role and level of access.

Read more Read less

One Identity Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    92%
  • Reviews
    77%
  • Momentum
    65%
  • Popularity
    89%

User Sentiment

Not Enough Reviews!

Write a Review

location iconAliso Viejo, California

Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

AWS IAM logo
Protection for entire AWS environment 4.6 Based on 133 Ratings
Visit Website + Add to Compare

What is AWS IAM and how does it work?

AWS IAM is an intuitive Identity and Access Management solution, allowing organizations monitor access to AWS based resources and APIs in a secure way. Enterprises can monitor users and groups or schedule specific access rights to various AWS resources using the IAM module within the software. Business houses get to define specific conditional terms like, time of the day and monitor employee’s access factors, such as whether they use SSL, their original IP address, or whether they have active authentication with an MFA device. AWS IAM can be utilized by organisations to identify and finetune their policies besides modifying controlled access to variable services. Enterprises can augment user credentials to protect their AWS environments, based on the AWS MFA security feature within the particular. The system prompts employees to demonstrate their physical possession of MFA-token hardwire or provide a valid code through an MFA-supported mobile device. AWS IAM is compatible with identity management solutions that support SAML2.0 besides the federation samples offered by AWS Console SSO.

Read more Read less

AWS IAM Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    75%
  • Momentum
    67%
  • Popularity
    73%

User Sentiment

  • Granular Access Control, Extensive Integrations
  • Complex Policy Management, Steep Learning Curve

location iconSeattle, Washington

Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Alloy logo
Identity management at its best Write a Review
Visit Website + Add to Compare

What is Alloy and how does it work?

Alloy is an intuitive identity decisioning portal helping out fintech companies and banks to automate proceedings regarding tasks like credit underwriting, onboarding and transactions. This unified API platform also connects users to their data accordingly, providing a detailed view of the user's behaviour from day one and beyond. As per reports, Alloy can be relied upon with a 50% reduction over manual reviews, 80% of account openings backed by automation and an 80% customer approval rate (automated). Data stored within Alloy are absolutely secure, based on Amazon Web Services backed by dedicated data centres located across the United States. The entire security setup is compliant with ISO 27001, Tier IV and SOC 2 facilities alike. Also, industry-grade KYC and fraud detection facilities offered by Alloy are teamed with 120+ data sources to eliminate fraud and malicious identities alike. Other use cases include the transformation of complex credit policies, multiple workflow linking and credit-wise application reviews.

Read more Read less

Alloy Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    96%
  • Reviews
    60%
  • Momentum
    69%
  • Popularity
    86%

User Sentiment

Not Enough Reviews!

Write a Review

location iconNew York City, New York

location iconLive Since 2015

Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Azure AD logo
Universal platform to manage and secure identities 4.3 Based on 440 Ratings
Visit Website + Add to Compare

What is Azure AD and how does it work?

Azure AD is an identity and access management solution from Microsoft, offering active protection from 99.9% cybersecurity attacks. The software offers single sign-on and conditional access rights, besides multiple developer tools. Thus making it easy for enterprises to integrate identity within their services and apps. Organisations can automate their individual workflows for user lifecycle and provisioning. Its self-service feature facilitates productivity within the on-site workers irrespective of their actual location. Azure AD facilitates cross-organisational collaboration, enabling vendors partners and contractors, get access to in-house resources in a hassle-free manner. Organisations can keep track of their AzureAD connect sync engine using the Connect Health monitor technology offered by the software. Automated policies and meaningful detailed insights offered by Azure AD ensure proper detection of malicious threats before they get to cause any potential damage. Its multi-factor authentication mechanism enables additional security layers, ensuring better protection.

Read more Read less

Azure AD Pricing

  • Free Trial Not Available
  • Starts at $6.00. Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    96%
  • Reviews
    81%
  • Momentum
    65%
  • Popularity
    71%

User Sentiment

  • Strong Authentication, Single Sign-On (SSO)
  • Complex Setup Process, Limited Customization Options

location iconRedmond, Washington

Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

WSO2 Identity Server logo
Enhanced digital experience for your customers 4.6 Based on 115 Ratings
Visit Website + Add to Compare

What is WSO2 Identity Server and how does it work?

WSO2 Identity Server offers AI-driven customer-oriented IAM solutions. With the program, organizations can provide a frictionless, and secure experience to their customers, digitally. The software supports SSO between various logged-in apps for an enhanced digital experience. It enables organizations to federate access to their web and mobile apps across multiple domains with open identity standards, including OIDC, SAML,and WS Federation. Enterprises get to ensure adaptive and multi-factor authentication based on key attributes like risk, context, and identity. The system helps enforce phishing proof and access validation based on security key, or FIDO2 supported biometrics. It is compliant with privacy regulations and industry standards, like CCPA, GDPR, etc. With WSO2 Identity Server enterprises get to evaluate, revoke, and record user consent while acting within privacy guidelines. With open standards like OAuth, the software provides secure access to microservices and APIs. Its inherent open-source value grants access to the program’s codebase. The API-driven solution offers enriched scalability as per the needs of an individual business.

Read more Read less

WSO2 Identity Server Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    82%
  • Momentum
    63%
  • Popularity
    65%

User Sentiment

  • Single Sign-On (SSO), Customization Options
  • Complex Configuration, Steep Learning Curve

location iconMountain View, California

Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

OpenLDAP logo
Effectively Oversee LDAP Databases with Full Authority 4.3 Based on 3 Ratings
Visit Website + Add to Compare

What is OpenLDAP and how does it work?

OpenLDAP is an open source Windows LDAP client and administration tool. This amazing software is designed to give users the power to efficiently manage their LDAP databases with complete control. OpenLDAP provides the ability for users to browse, search, remove, create, and modify data stored in the LDAP server. It also enables them to manage passwords and view schemas in detail. This incredibly valuable tool offers a high level of flexibility for those who use it while simultaneously generating the fast speeds necessary to keep up with any LDAP server requirements. OpenLDAP makes LDAP server management easy and efficient for professionals of all levels of technical understanding. With this application, professionals can easily review, troubleshoot, add, remove, and alter LDAP data on an LDAP server. OpenLDAP also offers password management and schema browsing capabilities, making it an ideal solution for managing complex data. With its many features, OpenLDAP is a valuable tool for professionals looking to maintain a secure LDAP environment.

Read more Read less

OpenLDAP Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    92%
  • Reviews
    67%
  • Momentum
    72%
  • Popularity
    72%

User Sentiment

Not Enough Reviews!

Write a Review

location iconLive Since 1998

Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Veriff logo
Seamless Identity Verification for Secure, Trusted Connections 1.8 Based on 111 Ratings
Visit Website + Add to Compare

What is Veriff and how does it work?

Veriff is setting the standard for secure and seamless identity verification. By combining cutting-edge AI technology with human verification, Veriff offers a robust suite of solutions, including Identity and Document Verification, Proof of Address checks, and Biometric Authentication. Businesses benefit from streamlined KYC Onboarding and AML Screening processes, ensuring compliance without compromising user experience. The platform supports features like Age Validation and Age Estimation which are critical for regulatory compliance and building trusted digital communities. With Veriff, users simply capture a photo of their government-issued ID and a selfie, completing verification on any device, whether iOS, Android™, or the web. Real-time feedback and automatic document type detection minimize errors and speed up the process. Veriff’s solutions drive efficiency, fraud protection, and operational intelligence, ensuring businesses onboard genuine customers while mitigating risks using advanced Fraud protection systems and Database Verification Checks. Elevate your customer experience and protect their business with Veriff’s proven tools.

Read more Read less

Veriff Pricing

  • Free Trial Available
  • Starts at $0.8. Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    96%
  • Reviews
    72%
  • Momentum
    63%
  • Popularity
    80%

User Sentiment

  • Fast Verification Process, Seamless User Experience
  • Unreliable Verification Process, Privacy Concerns

location iconTallinn, Estonia

location iconLive Since 2015

Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SecureAuth logo
Multi-factor authentication – Satisfy more use cases 4.7 Based on 33 Ratings
Visit Website + Add to Compare

What is SecureAuth and how does it work?

SecureAuth provides the most flexible and adaptable identity and access management solution to secure all workforce and customer identities everywhere: hybrid, on-prem, and cloud. Leading organizations use the SecureAuth Identity Platform to secure access for everyone and everything that connects to their business. SecureAuth helps reduce threat surface, enable user adoption and meet business demands by delivering a frictionless user experience that drives engagement and productivity.

Read more Read less

SecureAuth Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    79%
  • Momentum
    60%
  • Popularity
    83%

User Sentiment

Not Enough Reviews!

Write a Review

location iconIrvine, California

location iconLive Since 2005

Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ManageEngine ADManager Plus logo
An enterprise IGA solution for hybrid Active Directory environment 5 Based on 2 Ratings
Visit Website + Add to Compare

What is ManageEngine ADManager Plus and how does it work?

ADManager Plus is an identity governance and administration (IGA) tool built to securely manage and govern the identities in Active Directory (AD), Microsoft 365, Exchange, and Google Workspace environments With capabilities like management, reporting, risk assessment, access certification, event-driven automation, and more, ADManager Plus simplifies IGA for enterprises.

Read more Read less

ManageEngine ADManager Plus Pricing

  • Free Trial Available
  • Starts at $595.0. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    96%
  • Reviews
    69%
  • Momentum
    67%
  • Popularity
    67%

User Sentiment

  • User Friendly Interface, Extensive Reporting Capabilities
  • Occasional Technical Issues, Complex Security Setup

location iconPleasanton, CA - 94588

Visit Website

Buyer's Guide Read Buyer's Guide

Typical Features

  • Helps to view and manage access requests submitted by the personnel Access Request Management
  • Helps to manage user accounts within organisations Account Management
  • Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed Compliance Management
  • +8 more

Prices

41% software offer free trial

31% software offer freemium model

Software in Spotlight

Pricing Insights for Identity and Access Management (IAM) Software

  • The Average Cost of a basic Identity and Access Management (IAM) Software plan is $9 per month.

  • 41% of Identity and Access Management (IAM) Software offer a Free Trial Allows users to try out the software for a limited period before making a purchase decision. , while 31% offer a Freemium Model Allows users to access basic features at no cost..

List of Identity and Access Management (IAM) Software

PRODUCT NAME SW SCORE AGGREGATED RATINGS
Okta Okta 98 4.5
JumpCloud JumpCloud 97 4.7
OneLogin OneLogin 93 4.4
Shufti Pro Shufti Pro 91 4.7
Ping Identity Ping Identity 91 4.5
Idaptive Next-Gen Access Idaptive Next-Gen Access 90 4.5
RSA SecurID RSA SecurID 90 4.4
Gluu Gluu 90 5
Microsoft Entra ID Microsoft Entra ID 89 4.7
Keycloak Keycloak 88 4.5

Overview

Identity and Access Management (IAM) refers to a process that an organisation follows to identify, authenticate and authorise groups of people or individuals to gain access to systems, networks and applications, along with implied rights and restrictions with established identities. These include software processes which require access to organisational systems. It authenticates users and even dictates whether they can access particular applications and systems or not and to what level can they access it. It mainly focuses on the security and productivity of an organisation.

Identity and Access management software presents a strategy for the security system of a business organisation. They levy a high degree of control and enables the implementation of logging and accounting capabilities. These platforms can be applied universally and can include applications and devices which do not need any manual supervision. What makes this software very handy and efficient is that they can be operated on various devices. IAM software is extremely reliable, enable cost control and are incredibly scalable. However, there are certain things which should be kept in mind while selecting the apt software for your business enterprise.

  • Assure Compatibility: The Identity and access software that you choose for your organisation should have complete compliance with your business security systems, directory services, management consoles and other essentials. 
  • Scale from Pilot deployments: Before proceeding towards full-production deployment, it is highly essential to understand how this platform operates in an IT environment. Also, make sure the goals of your security policies remain unaltered by conducting ongoing security audits.
  • Verify internal support services: The tools, policies and procedures to be implemented should be well explained to the help desk and other support staff, including a proper training regarding social engineering and related attacks to ensure effective utilisation of the software’s products.

Features

Typical Features

Access Request Management

Helps to view and manage access requests submitted by the personnel

Account Management

Helps to manage user accounts within organisations

Compliance Management

Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

Multi-factor Authentication

Uses more than one method to verify a user's identity for a login

Password Management

Enables the administrator to manage, authenticate and reset passwords

Role Management

Helps regulate access to systems, based on individual roles

Single Sign-On (SSO)

Permits one set of login credentials to access multiple applications

User Activity Monitoring

Monitors and records user activities in the enterprise

API Access Management

Ensures that calls with authenticated access can enter APIs

Passwordless Login

Allows to login without password using other means of verification, e.g. SSH keys

Social Sign On

Allows users to sign on using credentials of social networking services

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed