Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (4)
Starting Price
  • (15)
  • (1)
  • (3)
  • (1)
  • (8)
Features
  • (70)
  • (68)
  • (68)
  • (66)
  • (65)
  • (59)
  • (54)
  • (52)
  • (44)
  • (39)
  • (32)
SW Score
  • (2)
  • (2)
  • (21)
  • (28)
  • (18)
Deployment
  • (11)
  • (6)
  • (81)
  • (22)
  • (19)
Customer Types
  • (6)
  • (5)
  • (79)
  • (80)
  • (75)
Pricing Model
  • (30)
  • (24)
  • (1)
  • (6)
  • (37)
  • (64)
Integrated With
  • (9)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 20 of 81 Products

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Keycloak logo
An Open-source Identity And Access Management Tool For Modern Applications 4.4 Based on 45 Ratings
View Details + Add to Compare

What is Keycloak and how does it work?

Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 73%
  • Momentum 70%
  • Popularity 73%

Keycloak Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Infisign logo
Transforming Identity & Access Management Write a Review
View Details + Add to Compare

What is Infisign and how does it work?

Infisign: The Future of Identity and Access Management. In today's digital landscape, identity and access management (IAM) is more critical than ever for securing systems and data. Yet traditional IAM solutions struggle to keep pace with modern IT environments and emerging threats. Introducing Infisign - the IAM platform built for the future. Infisign combines the latest innovations in decentralized identity, passwordless authentication, privileged access management (PAM), and federation to create a truly comprehensive approach to IAM. At its core is a decentralized architecture based on blockchain and cryptography, eliminating single points of failure. This enables robust identity proofing, secured credential issuance, and verifiable claims for superior access control. With Infisign, organizations can say goodbye to vulnerable passwords. Multi-factor authentication and FIDO2 security keys enable passwordless login for both admins and end users. Even privileged sessions can be initiated instantly without conventional passwords. This drastically reduces exposure to credential theft, phishing, and other identity attacks. The platform also centralizes and strictly governs privileged access through integrated PAM capabilities. Sensitive administrative actions are monitored in real-time and subject to automated controls according to pre-defined security policies. This prevents both insider and external threats from escalating privileges. For today's dynamic, multi-cloud environments, Infisign allows seamless federation across on-premise and cloud-based systems and supports integration with leading enterprise directories. The future-proof architecture readily adapts as technology and use cases evolve. With its defense-in-depth approach, enriched usability features, and cloud-native scalability, Infisign stands apart as the next generation of IAM. It’s time to step into the future. Reimagine IAM security with Infisign.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 90%
  • Reviews 60%
  • Momentum 67%
  • Popularity 67%

Infisign Pricing

  • Free Trial Not Available
  • Infisign Offers Custom plan.
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

PrivX logo
New Age Privileged Access Management Software Write a Review
View Details + Add to Compare

What is PrivX and how does it work?

PrivX is a cutting-edge PAM (Privileged Access Management) tool that delivers lean and easy-to-implement solutions. It helps to cut down the cost of vaulting and password lifecycle management by granting users a short-lived authentication. Deployment and maintenance efforts can economize as the use of the agents is being eliminated. Access management can be unified from a single UI and this helps in staying in sync with AD-systems and also generating reports of traffic quickly. The software helps in addressing the growing demands for cloud access. It discovers new hosts and automatically on-boards users while also off-boarding them from hosts that are no longer needed. Additionally, access can be granted and revoked automatically by syncing the software with the user’s existing ID management system. Core feature is the zero trust solution that simplifies complex access needs and also reduces the vulnerability of companies to breaches. It is also very easy to set up and scale as per the need.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 98%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

PrivX Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
View Details

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Red Hat Identity Management logo
"Red Hat IdM centralizes Linux identity management" Write a Review
View Details + Add to Compare

What is Red Hat Identity Management and how does it work?

Red Hat Identity Management (IdM) is the perfect solution for businesses seeking a comprehensive and unified system to manage identity stores, authentication, policies, and authorization policies in their Linux-based domain. With IdM, can guarantee secure access to the customers applications with fast performance. As it is based on open source technology, administrators have full control over every aspect of security to ensure everything is adapted to their needs. IdM delivers low costs of ownership as easy installation and reliable performance take out the strain of managing systems’ configurations. Get ready for a framework that is designed to simplify tasks yet maintain robust security standards. Businesses wanting a complete solution for the identity management needs need not look further - Red Hat Identity Management is here! Red Hat Identity Management is a game-changer, empowering professionals like to take charge of identity management with confidence and ease. Say goodbye to fragmented systems and hello to a centralized, unified approach, all while adhering to the strictest of industry standards. Seize the opportunity today, and unlock the true potential of the Linux-based domain with Red Hat IdM.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 60%
  • Momentum 62%
  • Popularity 64%

Red Hat Identity Management Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Okta logo
Seamless, secure, user-friendly, all that you can ask for 4.5 Based on 1545 Ratings
View Details + Add to Compare

What is Okta and how does it work?

Okta is an identity and access management software that provides great user experience and easy administration by connecting suppliers, partners and customers of an enterprise securely within a single loop. It is an identity provider having deep integrations to hundreds of apps, which can be accessed through multiple devices very safely and securely. Octa helps companies to modernize IT by enabling them to move faster automatically and even eliminate friction, build customer experiences by delighting them with personalised and inherently secure applications and even prevent data breaches by establishing people as the new security perimeter. In simple words, Okta sets an identity standard which is independent and neutral. It is a platform which securely connects the right people to the right technologies at the right time. It provides instant access to all apps with a single sign on, provides an added level of authentication which prevents identity attacks, encourages lifecycle management, centrally manages a universal directory in your organisation and even controls and manages API access securely.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 94%
  • Momentum 78%
  • Popularity 98%

Okta Pricing

  • Free Trial Available
  • Starts at $2.00. Offers Custom plan.
View Details

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Gluu logo
A Highly Secured Identity And Access Management Tool 5 Based on 1 Ratings
View Details + Add to Compare

What is Gluu and how does it work?

Gluu provides Single Sign-on (SSO), Two-factor authentication (2FA), and access management service to different types of companies. The SSO feature offers secure sign-on across OpenID Connect, SAML, and CAS web & mobile applications. Users can choose from a variety of 2FA mechanisms and business logic to enforce strong security everywhere. Using access management, users will have the capability to manage who can access which resources across the digital kingdom. Gluu enables companies to bridge existing LDAP identity systems and Active Directory to give apps secure access to user data. The tool also helps in the fast deployment of code using Linux packages for Ubuntu, CentOS, RHEL, and Debian on any cloud platform. Using the in-built features, companies can also add, edit, and manage people, groups, and user attributes to ensure valid information is released to the right applications and services. It allows data movement between Gluu and existing identity management (IDM) tools by leveraging LDAP and SCIM APIs.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 73%
  • Momentum 66%
  • Popularity 81%

Gluu Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

IronVest logo
Secure your accounts Write a Review
View Details + Add to Compare

What is IronVest and how does it work?

IronVest is revolutionizing the way people protect their personal information online. This is an all-in-one super app that provides ultimate protection for online accounts and transactions. This ensures that only can access accounts, by utilizing state-of-the-art two-factor authentication. IronVest also generates masked emails, single-use virtual credit cards and virtual mobile numbers to ensure maximum security for online payments and transactions. IronVest is designed to provide peace of mind and security, without sacrificing convenience. This is simple to use, secure, and reliable. With IronVest, can rest assured that personal data is safe and secure when they shopping, banking, or conducting any other online activities. IronVest is the best way to protect your personal data and keep online accounts and transactions secure.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 86%
  • Reviews 60%
  • Momentum 65%
  • Popularity 76%

IronVest Pricing

  • Free Trial Available
  • Starts at $3.25. Offers Free-forever plan.
View Details

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Authentik logo
The Identity Provider with Unmatched Versatility Today Write a Review
View Details + Add to Compare

What is Authentik and how does it work?

Authentik is the most versatile Identity Provider available today. For professionals requiring the highest standard of digital security and looking to extend their existing environment with additional protocols, Authentik is the perfect choice. Authentik allows easily to authenticate users in customers application without the hassle of arduous user sign-up procedures or forgotten password resets. It also enables other authentication methods such as OpenID Connect and OAuth2 protocols, meaning that customer can enjoy support for any type of authentication method that wish to integrate into customers application. Authentik is open-source so that it can be further customized according to unique needs and specifications. Because of its flexibility, it's also incredibly easy to implement new protocols or refine existing ones within a short period of time. Better yet, Authentik represents good value for money as its pricing structure is highly competitive among providers offering similar services. Furthermore, its team of developers are experienced and knowledgeable in this field, meaning customer can rest assured knowing that data is safe with them. For those seeking an exceptional identity provider with expert support and impressive customizability options, look no further than Authentik – the ideal solution for reliable authentication processes.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 96%
  • Reviews 60%
  • Momentum 68%
  • Popularity 68%

Authentik Pricing

  • Free Trial Not Available
  • Starts at $5.00. Offers Free-forever plan.
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

FreeIPA logo
Provides dynamic identity and information security management solutions Write a Review
View Details + Add to Compare

What is FreeIPA and how does it work?

FreeIPA is an enhanced security information monitoring solution featuring command line administrative tools and web-interface as well. It is an integrated authentication and identity solution for UNIX/Linux networks. The active server within the particular enables centralized authorization, authentication and account related information. FreeIPA is an integrated solution, generated by combining Linux Fedora, MIT Kerberos, 389 Directory Server, DNS, NTP, SSSD, Dogtag certificate system, and more. The program is inclusive of open-source components and adheres to standard privacy protocols. The software helps enterprises with installation and configuration tasks automation. It allows organizations to achieve higher redundancy and scalability with comprehensive multi-master replication. The solution provides Python SDK, and extensible interfaces like JSON RPC API, XMLRPC etc. It can also be used to generate mutual trust with external identity monitoring systems like Microsoft Active Directory. FreeIPA ensures high levels of scalability and redundancy besides automated installation and configuration procedures.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 60%
  • Momentum 66%
  • Popularity 69%

FreeIPA Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Silverfort logo
Allow secure access and authentication process across business networks and cloud environments 4.9 Based on 17 Ratings
View Details + Add to Compare

What is Silverfort and how does it work?

Silverfort is an agentless multi-factor authentication platform that helps organizations deploy secure authentication and access, across their cloud environments and in-house networks in a non-intrusive and holistic way. The platform is designed to facilitate system MFA alongside interfaces that no other softwares could protect till date. It also includes legacy and homegrown applications, databases, file systems, critical infrastructure, along with admin access tools like PsExec that currently permit attackers to avoid agent-based MFA. Also, an integrated holistic authentication module within the particular offers unified access and authentication policies across multiple assets, users, and environments, both in the cloud and on-premises. Additionally, a robust AI-powered trust and risk engine, analyzes all machine and human access requests both on the perimeter and within the network in a continuous way. The software not only serves as a non-intrusive authentication platform, but also enhances the user experience and reduces disruptions by minimizing the MFA request numbers.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 91%
  • Reviews 72%
  • Momentum 62%
  • Popularity 63%

Silverfort Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Cognito logo
Step-up your identity verification services with Cognito 5 Based on 1 Ratings
View Details + Add to Compare

What is Cognito and how does it work?

Cognito is an Identity and Access Management software that comes with an identity verification service and needs just a phone number to begin verifying your customers, which in turn assists you in streamlining your flow and cutting down troublesome inputs. It helps minimize manual review to the maximum while increasing match rate through highest quality regulated data on the market. It slowly gathers all required data from customers to verify them with the least information provided, without compromising on security and adhering to the strictest standards and best policies prevalent in the industry. It even automates compliance processes with the assistance of modern systems, helps verify age of customers if you happen to sell age-restricted goods and services and even enables real-time sanction screening while dealing with potential customers. It makes sharing links and creating new verification links possible, without writing codes, through its powerful and intuitive dashboard. Last, but not the least, the data that Cognito software provides is primary and hundred percent up-to-date.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 66%
  • Momentum 66%
  • Popularity 76%

Cognito Pricing

  • Free Trial Available
  • Starts at $0.10.
View Details

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

OpenLDAP logo
Effectively Oversee LDAP Databases with Full Authority 4.3 Based on 3 Ratings
View Details + Add to Compare

What is OpenLDAP and how does it work?

OpenLDAP is an open source Windows LDAP client and administration tool. This amazing software is designed to give users the power to efficiently manage their LDAP databases with complete control. OpenLDAP provides the ability for users to browse, search, remove, create, and modify data stored in the LDAP server. It also enables them to manage passwords and view schemas in detail. This incredibly valuable tool offers a high level of flexibility for those who use it while simultaneously generating the fast speeds necessary to keep up with any LDAP server requirements. OpenLDAP makes LDAP server management easy and efficient for professionals of all levels of technical understanding. With this application, professionals can easily review, troubleshoot, add, remove, and alter LDAP data on an LDAP server. OpenLDAP also offers password management and schema browsing capabilities, making it an ideal solution for managing complex data. With its many features, OpenLDAP is a valuable tool for professionals looking to maintain a secure LDAP environment.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 67%
  • Momentum 60%
  • Popularity 72%

OpenLDAP Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.
View Details

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

One Identity logo
Eliminate potential risks out of and access management and enterprise identity 3.7 Based on 10 Ratings
View Details + Add to Compare

What is One Identity and how does it work?

One Identity is an advanced identity and access management tool that helps businesses to establish an identity-centric security strategy with Privileged Access Management (PAM) solutions. The tool helps to mitigate risk, secure data, satisfy compliance and meet uptime requirements by offering customers access to data and applications they need. With the Identity Manager, users can not only unify information security policies but can even fulfil governance needs in present times and into the future. One Identity comes with certified SAP integration offering advanced capabilities to enhance existing SAP security models and even improves them. Businesses can make better decisions by combining security information and policies from multiple sources to reduce risks. Further, One Identity provides auditors with detailed, real-time governance reports that include information about the available resources in the users’ environment and who has access to them. The tool also helps to achieve unified governance for all employees, regardless of their role and level of access.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 78%
  • Momentum 68%
  • Popularity 89%

One Identity Pricing

  • Free Trial Available
  • Offers Custom plan.
View Details

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

RSA SecurID logo
Be secure and organised with this identity & access software 4.4 Based on 366 Ratings
View Details + Add to Compare

What is RSA SecurID and how does it work?

RSA SecurID is an identity and access management software that offers a seamless access experience to users by using two-factor authentication for protecting networks. Right from the ground to the cloud, this software uses identity insights, threat intelligence and business context for delivering a safe and secure access to all your users across all your applications and gadgets. It provides a one-powerful suite-of-solutions through a range of features which include multi-factor authentication, identity governance, risk based access management and user lifecycle management, all in one loop. In this era of growing cyber crimes, RSA SecurID provides an analytically-driven insight to prioritize identity risks and protects assets accordingly through successfully designed Identity and access management programs which monitor complete control over who gets access to what. Undoubtedly, it offers a complete solution for security and control to keep ahead of growing threats.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 98%
  • Reviews 89%
  • Momentum 63%
  • Popularity 66%

RSA SecurID Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Practice Protect logo
Simplest way for Accountants to secure 4.9 Based on 21 Ratings
View Details + Add to Compare

What is Practice Protect and how does it work?

Practice Protect is the accounting-specific cybersecurity platform that makes it quick & easy to secure and control client data, wherever your people work. Practice Protect tracks every access attempt to every application, so you have a complete log of who accessed what, from where. Practice Protect has Multi-Factor Authentication via a second code, sent directly to your phone or email address for ultimate security

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 77%
  • Momentum 62%
  • Popularity 81%

Practice Protect Pricing

  • Free Trial Not Available
  • Starts at $17.00. Offers Custom plan.
View Details

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

MojoAuth logo
Secure Access Simplified Write a Review
View Details + Add to Compare

What is MojoAuth and how does it work?

MojoAuth provides a secure and exceptional login experience with just two lines of code. It allows users to authenticate through their social accounts, email magic link, and OTP sent to their respective email and phone numbers. It also supports advanced authentication methods like fingerprint, facial recognition, and security keys. Moreover, it is compliant with various essential regulations like GDPR, CCPA, etc.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 85%
  • Reviews 60%
  • Momentum 64%
  • Popularity 72%

MojoAuth Pricing

  • Free Trial Not Available
  • Starts at $140.00. Offers Free-forever and Custom plan.
View Details

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SecureAuth logo
Multi-factor authentication – Satisfy more use cases 4.7 Based on 33 Ratings
View Details + Add to Compare

What is SecureAuth and how does it work?

SecureAuth provides the most flexible and adaptable identity and access management solution to secure all workforce and customer identities everywhere: hybrid, on-prem, and cloud. Leading organizations use the SecureAuth Identity Platform to secure access for everyone and everything that connects to their business. SecureAuth helps reduce threat surface, enable user adoption and meet business demands by delivering a frictionless user experience that drives engagement and productivity.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 97%
  • Reviews 81%
  • Momentum 60%
  • Popularity 83%

SecureAuth Pricing

  • Free Trial Not Available
  • Offers Custom plan.
View Details

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

389 Directory Server logo
"389 Directory Server: Vital network asset" Write a Review
View Details + Add to Compare

What is 389 Directory Server and how does it work?

The 389 Directory Server is an essential resource for any professional network. Developed by the reliable Red Hat team, customer can be sure that the 389 Directory Server will support the customers business operations in a secure, flexible and highly scalable way. Designed specifically to provide robust Lightweight Directory Access Protocol (LDAP) services, it boasts unmatched performance and scalability, making it an ideal solution for larger organizations needing to store and manage even more data. The "389" name originates from the port number that it uses when handling LDAP requests, which makes for an easier integration into existing infrastructures. With its intuitive system administration console, customers are guaranteed a user-friendly operational experience. It's also open source software, meaning customizations are easily made, with extensive online documentation to guide the customer through any setup or configuration efforts needed. Let the 389 Directory Server to go-to the solution for LDAP server needs today!

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 60%
  • Momentum 60%
  • Popularity 66%

389 Directory Server Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.
View Details

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

heylogin logo
Web-based tools for managing employee performance and talent Write a Review
View Details + Add to Compare

What is heylogin and how does it work?

Halogen Software is a well-known and trusted tool for managing performance and talent. Halogen Software, a global leader in customer satisfaction and endorsed by hundreds of thousands of HR professionals, provides you with a ground-breaking personnel management solution built from the ground up to assure improved performance for organizations in all industries. Its cutting-edge cloud-based technologies automate, simplify, and combine performance reviews, in-depth feedback, succession planning, compensation management, job descriptions, learning management, and, of course, recruiting.Halogen Software automates your business operations in the way you want them to be automated. You can create any type of performance management procedure you want using the point-and-click capability. Halogen eAppraisal manages your workflow, sending out automatic email reminders to keep the process moving along and securing completed reviews with electronic signatures. You also don't have to rely on the IT department to make adjustments.With its large collection of comment helper texts, development, and coaching advice that can simply be edited and extended, it makes writing assessments simpler, faster, and more meaningful, saving time and improving consistency and quality of feedback.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 67%
  • Momentum 60%
  • Popularity 76%

heylogin Pricing

  • Free Trial Available
  • Starts at $5.99. Offers Free-forever and Custom plan.
View Details

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Azure AD logo
Universal platform to manage and secure identities 4.3 Based on 440 Ratings
View Details + Add to Compare

What is Azure AD and how does it work?

Azure AD is an identity and access management solution from Microsoft, offering active protection from 99.9% cybersecurity attacks. The software offers single sign-on and conditional access rights, besides multiple developer tools. Thus making it easy for enterprises to integrate identity within their services and apps. Organisations can automate their individual workflows for user lifecycle and provisioning. Its self-service feature facilitates productivity within the on-site workers irrespective of their actual location. Azure AD facilitates cross-organisational collaboration, enabling vendors partners and contractors, get access to in-house resources in a hassle-free manner. Organisations can keep track of their AzureAD connect sync engine using the Connect Health monitor technology offered by the software. Automated policies and meaningful detailed insights offered by Azure AD ensure proper detection of malicious threats before they get to cause any potential damage. Its multi-factor authentication mechanism enables additional security layers, ensuring better protection.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 96%
  • Reviews 81%
  • Momentum 60%
  • Popularity 70%

Azure AD Pricing

  • Free Trial Not Available
  • Starts at $6.00. Offers Free-forever and Custom plan.
View Details

Buyer's Guide Read Buyer's Guide

Typical Features

  • Helps to view and manage access requests submitted by the personnel Access Request Management
  • Helps to manage user accounts within organisations Account Management
  • Uses more than one method to verify a user's identity for a login Multi-factor Authentication
  • +8 more

Prices

38% software offer free trial

30% software offer freemium model

Software in Spotlight

Frontegg logo

Frontegg

5

Pricing Insights for Identity and Access Management (IAM) Software

  • The Average Cost of a basic Identity and Access Management (IAM) Software plan is $6 per month.

  • 38% of Identity and Access Management (IAM) Software offer a Free Trial Allows users to try out the software for a limited period before making a purchase decision. , while 30% offer a Freemium Model Allows users to access basic features at no cost..

List of Identity and Access Management (IAM) Software

PRODUCT NAME SW SCORE AGGREGATED RATINGS
Keycloak Keycloak 88 4.4
Infisign Infisign 82 0
PrivX PrivX 83 0
Red Hat Identity Management Red Hat Identity Management 81 0
Okta Okta 98 4.5
Gluu Gluu 90 5
IronVest IronVest 83 0
Authentik Authentik 85 0
FreeIPA FreeIPA 83 0
Silverfort Silverfort 83 4.9

Overview

Identity and Access Management (IAM) refers to a process that an organisation follows to identify, authenticate and authorise groups of people or individuals to gain access to systems, networks and applications, along with implied rights and restrictions with established identities. These include software processes which require access to organisational systems. It authenticates users and even dictates whether they can access particular applications and systems or not and to what level can they access it. It mainly focuses on the security and productivity of an organisation.

Identity and Access management software presents a strategy for the security system of a business organisation. They levy a high degree of control and enables the implementation of logging and accounting capabilities. These platforms can be applied universally and can include applications and devices which do not need any manual supervision. What makes this software very handy and efficient is that they can be operated on various devices. IAM software is extremely reliable, enable cost control and are incredibly scalable. However, there are certain things which should be kept in mind while selecting the apt software for your business enterprise.

  • Assure Compatibility: The Identity and access software that you choose for your organisation should have complete compliance with your business security systems, directory services, management consoles and other essentials. 
  • Scale from Pilot deployments: Before proceeding towards full-production deployment, it is highly essential to understand how this platform operates in an IT environment. Also, make sure the goals of your security policies remain unaltered by conducting ongoing security audits.
  • Verify internal support services: The tools, policies and procedures to be implemented should be well explained to the help desk and other support staff, including a proper training regarding social engineering and related attacks to ensure effective utilisation of the software’s products.

Features

Typical Features

Access Request Management

Helps to view and manage access requests submitted by the personnel

Account Management

Helps to manage user accounts within organisations

Multi-factor Authentication

Uses more than one method to verify a user's identity for a login

Compliance Management

Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

Password Management

Enables the administrator to manage, authenticate and reset passwords

Role Management

Helps regulate access to systems, based on individual roles

Single Sign-On (SSO)

Permits one set of login credentials to access multiple applications

User Activity Monitoring

Monitors and records user activities in the enterprise

API Access Management

Ensures that calls with authenticated access can enter APIs

Passwordless Login

Allows to login without password using other means of verification, e.g. SSH keys

Social Sign On

Allows users to sign on using credentials of social networking services

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed